Out-of-Bounds Affecting bochs package, versions <2.3+20070705-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-BOCHS-1542656
  • published30 May 2007
  • disclosed30 May 2007

Introduced: 30 May 2007

CVE-2007-2893  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Debian:12 bochs to version 2.3+20070705-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bochs package and not the bochs package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

Heap-based buffer overflow in the bx_ne2k_c::rx_frame function in iodev/ne2k.cc in the emulated NE2000 device in Bochs 2.3 allows local users of the guest operating system to write to arbitrary memory locations and gain privileges on the host operating system via vectors that cause TXCNT register values to exceed the device memory size, aka "RX Frame heap overflow."

CVSS Scores

version 3.1