Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2019-6778
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
22.8%
CVSS Severity
CVSS v3 Score
7.8
CVSS v2 Score
4.6
References
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
http://www.openwall.com/lists/oss-security/2019/01/24/5
http://www.securityfocus.com/bid/106758
https://access.redhat.com/errata/RHSA-2019:1883
https://access.redhat.com/errata/RHSA-2019:1968
https://access.redhat.com/errata/RHSA-2019:2425
https://access.redhat.com/errata/RHSA-2019:2892
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/
https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html
https://seclists.org/bugtraq/2019/May/76
https://usn.ubuntu.com/3923-1/
https://www.debian.org/security/2019/dsa-4454
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
http://www.openwall.com/lists/oss-security/2019/01/24/5
http://www.securityfocus.com/bid/106758
https://access.redhat.com/errata/RHSA-2019:1883
https://access.redhat.com/errata/RHSA-2019:1968
https://access.redhat.com/errata/RHSA-2019:2425
https://access.redhat.com/errata/RHSA-2019:2892
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/
https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg03132.html
https://seclists.org/bugtraq/2019/May/76
https://usn.ubuntu.com/3923-1/
https://www.debian.org/security/2019/dsa-4454
Products affected by CVE-2019-6778
Qemu
»
Qemu
»
Version:
3.0.0
cpe:2.3:a:qemu:qemu:3.0.0
Canonical
»
Ubuntu Linux
»
Version:
14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04
Canonical
»
Ubuntu Linux
»
Version:
16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04
Canonical
»
Ubuntu Linux
»
Version:
18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04
Canonical
»
Ubuntu Linux
»
Version:
18.10
cpe:2.3:o:canonical:ubuntu_linux:18.10
Fedoraproject
»
Fedora
»
Version:
29
cpe:2.3:o:fedoraproject:fedora:29
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Opensuse
»
Leap
»
Version:
15.0
cpe:2.3:o:opensuse:leap:15.0
Opensuse
»
Leap
»
Version:
42.3
cpe:2.3:o:opensuse:leap:42.3
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved