[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2015-5279

Date: (C)2015-09-29   (M)2017-11-18 


Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

CVSS Score: 7.2Access Vector: LOCAL
Exploit Score: 3.9Access Complexity: LOW
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1033569
BID-76746
DSA-3361
DSA-3362
GLSA-201602-01
RHSA-2015:1896
RHSA-2015:1923
RHSA-2015:1924
RHSA-2015:1925
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
http://www.openwall.com/lists/oss-security/2015/09/15/3
http://git.qemu.org/?p=qemu.git;a=commit;h=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

CWE    1
CWE-119
OVAL    17
oval:org.secpod.oval:def:109611
oval:org.secpod.oval:def:109588
oval:org.secpod.oval:def:109568
oval:org.secpod.oval:def:501691
...

© 2013 SecPod Technologies