CVE-2025-12464
Deferred Deferred - Pending Action
BaseFortify

Publication date: 2025-10-31

Last updated on: 2026-05-06

Assigner: Red Hat, Inc.

Description
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
qemu qemu *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow in the QEMU-KVM e1000 network device. It happens because the code that pads short network frames was moved to the core network code, but the e1000 device's receive function still processes short frames in loopback mode without proper handling. This leads to a buffer overrun in the e1000_receive_iov() function when processing these short frames, which can be exploited by a malicious guest user to crash the QEMU process on the host. [1]


How can this vulnerability impact me? :

Exploiting this vulnerability allows a malicious guest user to cause the QEMU process on the host to crash, resulting in a denial of service (DoS). This means that the host system running QEMU-KVM could become unavailable or unstable due to the crash triggered by the buffer overflow. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart