Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-3284-1 | qemu security update |
![]() |
DSA-3285-1 | qemu-kvm security update |
![]() |
DSA-3286-1 | xen security update |
![]() |
EUVD-2015-3272 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. |
![]() |
USN-2630-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.977Z
Reserved: 2015-04-10T00:00:00
Link: CVE-2015-3209

No data.

Status : Deferred
Published: 2015-06-15T15:59:00.070
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-3209


No data.