mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 15:15:46 +02:00
1.7 KiB
1.7 KiB
CVE-2020-14364
Description
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
POC
Reference
No PoCs from references.
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ArrestX/--POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Live-Hack-CVE/CVE-2020-14364
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Resery/Learning_Record
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/V1NKe/learning-qemu
- https://github.com/WinMin/awesome-vm-exploit
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/gejian-iscas/CVE-2020-14364
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/qianfei11/QEMU-CVES
- https://github.com/soosmile/POC
- https://github.com/xtxtn/vnctf2024-escape_langlang_mountain2wp
- https://github.com/y-f00l/CVE-2020-14364