Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
References
Configurations
History
No history.
Information
Published : 2016-10-05 16:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-7161
Mitre link : CVE-2016-7161
CVE.ORG link : CVE-2016-7161
JSON object : View
Products Affected
debian
- debian_linux
qemu
- qemu
CWE
CWE-787
Out-of-bounds Write