[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2015-5279Date: (C)2015-09-29   (M)2018-05-10


Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 7.2
Exploit Score: Exploit Score: 3.9
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: LOCAL
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
SECTRACK-1033569
BID-76746
DSA-3361
DSA-3362
FEDORA-2015-16368
FEDORA-2015-16369
FEDORA-2015-16370
GLSA-201602-01
RHSA-2015:1896
RHSA-2015:1923
RHSA-2015:1924
RHSA-2015:1925
SUSE-SU-2015:1782
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
http://www.openwall.com/lists/oss-security/2015/09/15/3
http://git.qemu.org/?p=qemu.git;a=commit;h=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

CWE    1
CWE-119
OVAL    17
oval:org.secpod.oval:def:26888
oval:org.secpod.oval:def:602233
oval:org.secpod.oval:def:702753
oval:org.secpod.oval:def:602231
...

© SecPod Technologies