Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7504

Опубликовано: 16 окт. 2017
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.5+dfsg-1package
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html

  • Xen not affected in wheezy, CVE covered by XSA-162: https://marc.info/?l=oss-security&m=144888089404618&w=2

EPSS

Процентиль: 71%
0.00712
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

redhat
больше 9 лет назад

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

CVSS3: 8.8
nvd
больше 7 лет назад

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

CVSS3: 8.8
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.8
github
около 3 лет назад

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

EPSS

Процентиль: 71%
0.00712
Низкий