Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5279

Опубликовано: 28 сент. 2015
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.4+dfsg-3package
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html

EPSS

Процентиль: 92%
0.07675
Низкий

Связанные уязвимости

ubuntu
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

redhat
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

nvd
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

github
больше 3 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

oracle-oval
почти 10 лет назад

ELSA-2015-2065: xen security update (IMPORTANT)

EPSS

Процентиль: 92%
0.07675
Низкий