CVE-2016-7161

Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
qemuqemu
𝑥
≤ 2.6.2
qemuqemu
2.7.0:rc0
qemuqemu
2.7.0:rc1
qemuqemu
2.7.0:rc2
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
yakkety
Fixed 1:2.6.1+dfsg-0ubuntu5.1
released
xenial
Fixed 1:2.5+dfsg-5ubuntu10.6
released
trusty
Fixed 2.0.0+dfsg-2ubuntu1.30
released
precise
dne
qemu-kvm
yakkety
dne
xenial
dne
trusty
dne
precise
Fixed 1.0+noroms-0ubuntu14.31
released