Versio.io

CVE-2015-3209

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 15-06-2015 05:59
Last modified: - 11-02-2022 06:40
Total changes: - 3

Description

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Common Vulnerability Scoring System (CVSS)

AV:N/AC:L/Au:N/C:P/I:P/A:P
Low
Attack complexity
Network
Attack vector
Low
Availability
Low
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
7.5
Base score
10.0
6.4
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=qemu AND product=qemu AND versionEndIncluding=2.3.1
OR
vendor=juniper AND product=junos_space AND versionEndIncluding=15.1
OR
vendor=canonical AND product=ubuntu_linux AND version=12.04 AND software_edition=esm
vendor=canonical AND product=ubuntu_linux AND version=14.04 AND software_edition=esm
vendor=canonical AND product=ubuntu_linux AND version=14.10
vendor=canonical AND product=ubuntu_linux AND version=15.04
OR
vendor=Debian AND product=debian_linux AND version=7.0
vendor=Debian AND product=debian_linux AND version=8.0
OR
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_desktop AND version=6.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_eus AND version=6.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server AND version=5.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server AND version=6.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_aus AND version=6.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_tus AND version=6.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_workstation AND version=5.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_workstation AND version=6.0
AND
OR
vendor=Red Hat Enterprise Linux AND product=openstack AND version=5.0
vendor=Red Hat Enterprise Linux AND product=virtualization AND version=3.0
OR
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6.0
OR
vendor=fedoraproject AND product=fedora AND version=20
vendor=fedoraproject AND product=fedora AND version=21
vendor=fedoraproject AND product=fedora AND version=22
OR
vendor=suse AND product=linux_enterprise_debuginfo AND version=11 AND update=sp2
vendor=suse AND product=linux_enterprise_desktop AND version=11 AND update=sp3
vendor=suse AND product=linux_enterprise_desktop AND version=12 AND update=-
vendor=suse AND product=linux_enterprise_server AND version=10 AND update=sp4 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=11 AND update=sp1 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=11 AND update=sp2 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=11 AND update=sp3 AND target_software=-
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=-
vendor=suse AND product=linux_enterprise_software_development_kit AND version=11 AND update=sp3
vendor=suse AND product=linux_enterprise_software_development_kit AND version=12 AND update=-
OR
vendor=arista AND product=eos AND version=4.12
vendor=arista AND product=eos AND version=4.13
vendor=arista AND product=eos AND version=4.14
vendor=arista AND product=eos AND version=4.15
 

Reference

 


Keywords

NVD

 

CVE-2015-3209

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.