CVE-2007-1366

N/A Unknown
Published: May 02, 2007 Modified: April 23, 2026
View on NVD

Description

QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by "aam 0x0," which triggers a divide-by-zero error.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.gnu.org/archive/html/qemu-devel/2007-04/msg00650.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.gnu.org/archive/html/qemu-devel/2007-04/msg00651.html
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://osvdb.org/35498
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/25073
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25095
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/29129
Source: cve@mitre.org
Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf
Source: cve@mitre.org
Technical Description Third Party Advisory
http://www.debian.org/security/2007/dsa-1284
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/23731
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597
Source: cve@mitre.org
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34046
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.gnu.org/archive/html/qemu-devel/2007-04/msg00650.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.gnu.org/archive/html/qemu-devel/2007-04/msg00651.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://osvdb.org/35498
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25073
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25095
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/29129
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://taviso.decsystem.org/virtsec.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Technical Description Third Party Advisory
http://www.debian.org/security/2007/dsa-1284
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/23731
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1597
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34046
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
20th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

qemu debian