[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2015-5279

Date: (C)2015-09-29   (M)2017-07-11
 
CVSS Score: 7.2Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

Reference:
SECTRACK-1033569
BID-76746
GLSA-201602-01
RHSA-2015:1896
RHSA-2015:1923
RHSA-2015:1924
RHSA-2015:1925
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
http://www.openwall.com/lists/oss-security/2015/09/15/3
http://git.qemu.org/?p=qemu.git;a=commit;h=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

CWE    1
CWE-119
OVAL    17
oval:org.secpod.oval:def:109611
oval:org.secpod.oval:def:109568
oval:org.secpod.oval:def:501691
oval:org.secpod.oval:def:1501195
...

© 2013 SecPod Technologies