CVE-2007-6227

QEMU 0.9.0 - Memory Buffer Overflow via Windows Executable Program

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-6227. PoCs published by TeLeMan.

AI-analyzed exploit summary The provided text describes a local denial-of-service vulnerability in QEMU 0.9.0 due to inadequate boundary checks on user-supplied input. The issue may also allow arbitrary code execution, though this is unconfirmed.

Description

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as demonstrated by qemu-dos.com.

Exploits (1)

exploitdb WRITEUP VERIFIED
by TeLeMan · textdoslinux
https://www.exploit-db.com/exploits/30837

The provided text describes a local denial-of-service vulnerability in QEMU 0.9.0 due to inadequate boundary checks on user-supplied input. The issue may also allow arbitrary code execution, though this is unconfirmed.

Classification
Writeup 90%
Attack Type
Dos
Complexity
Moderate
Reliability
Theoretical
Target: QEMU 0.9.0
No auth needed
Prerequisites: Local access to the system running QEMU
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/484429/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26666
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38806
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29129

Scores

EPSS 0.0030
EPSS Percentile 53.0%

Details

CWE
CWE-119
Status published
Products (1)
qemu/qemu 0.9.0
Published Dec 04, 2007
Tracked Since Feb 18, 2026