Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5279

Опубликовано: 28 сент. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

РелизСтатусПримечание
devel

released

1:2.3+dfsg-5ubuntu7
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.19
precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.19
trusty/esm

released

2.0.0+dfsg-2ubuntu1.19
upstream

needed

vivid

released

1:2.2+dfsg-5expubuntu9.5

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

released

1.0+noroms-0ubuntu14.25
trusty

DNE

trusty/esm

DNE

upstream

needed

vivid

DNE

Показывать по

EPSS

Процентиль: 92%
0.07675
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

nvd
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

debian
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne ...

github
больше 3 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

oracle-oval
почти 10 лет назад

ELSA-2015-2065: xen security update (IMPORTANT)

EPSS

Процентиль: 92%
0.07675
Низкий

7.2 High

CVSS2