Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3209

Опубликовано: 15 июн. 2015
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.3+dfsg-6package
qemufixed1.1.2+dfsg-6a+deb7u8wheezypackage
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage
xenfixed4.4.0-1package
xenend-of-lifesqueezepackage
xen-qemu-dm-4.0removedpackage
xen-qemu-dm-4.0end-of-lifesqueezepackage

Примечания

  • Xen switched to qemu-system in 4.4.0-1

  • http://xenbits.xen.org/xsa/advisory-135.html

EPSS

Процентиль: 89%
0.04545
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

redhat
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

nvd
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

github
больше 3 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

oracle-oval
около 10 лет назад

ELSA-2015-1189: kvm security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04545
Низкий