[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-5279Date: (C)2015-09-29   (M)2023-12-22


Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.2
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1033569
BID-76746
DSA-3361
DSA-3362
FEDORA-2015-16368
FEDORA-2015-16369
FEDORA-2015-16370
GLSA-201602-01
RHSA-2015:1896
RHSA-2015:1923
RHSA-2015:1924
RHSA-2015:1925
SUSE-SU-2015:1782
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
http://www.openwall.com/lists/oss-security/2015/09/15/3
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14

CWE    1
CWE-119
OVAL    18
oval:org.secpod.oval:def:109611
oval:org.secpod.oval:def:109588
oval:org.secpod.oval:def:109568
oval:org.secpod.oval:def:52580
...

© SecPod Technologies