Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Arista
Subscribe
|
Eos
Subscribe
|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Juniper
Subscribe
|
Junos Space
Subscribe
|
|
Qemu
Subscribe
|
Qemu
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Openstack
Subscribe
Rhel Virtualization
Subscribe
Virtualization
Subscribe
|
|
Suse
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3284-1 | qemu security update |
Debian DSA |
DSA-3285-1 | qemu-kvm security update |
Debian DSA |
DSA-3286-1 | xen security update |
EUVD |
EUVD-2015-3272 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. |
Ubuntu USN |
USN-2630-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.977Z
Reserved: 2015-04-10T00:00:00
Link: CVE-2015-3209
No data.
Status : Deferred
Published: 2015-06-15T15:59:00.070
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-3209
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN