CVE-2007-6227
QEMU 0.9.0 - Memory Buffer Overflow via Windows Executable Program
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2007-6227. PoCs published by TeLeMan.
AI-analyzed exploit summary The provided text describes a local denial-of-service vulnerability in QEMU 0.9.0 due to inadequate boundary checks on user-supplied input. The issue may also allow arbitrary code execution, though this is unconfirmed.
Description
QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as demonstrated by qemu-dos.com.
Exploits (1)
The provided text describes a local denial-of-service vulnerability in QEMU 0.9.0 due to inadequate boundary checks on user-supplied input. The issue may also allow arbitrary code execution, though this is unconfirmed.