Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Vigil@nce - QEMU: use after free via USB Redirector Device Emulation, analyzed on 06/08/2021

October 2021 by Vigil@nce

Vigil@nce - An attacker, inside a guest system, can force the usage of a freed memory area via USB Redirector Device Emulation of QEMU, in order to trigger a denial of service, and possibly to run code on the host system.

Site: Vigil@nce


See previous articles

    

See next articles