CVE-2009-3616

Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
References
Link Resource
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 Broken Link Exploit
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 Broken Link Exploit
http://marc.info/?l=qemu-devel&m=124324043812915 Mailing List
http://rhn.redhat.com/errata/RHEA-2009-1272.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/10/16/5 Mailing List Patch
http://www.openwall.com/lists/oss-security/2009/10/16/8 Mailing List Patch
http://www.securityfocus.com/bid/36716 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=501131 Issue Tracking Patch
https://bugzilla.redhat.com/show_bug.cgi?id=505641 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=508567 Issue Tracking
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 Broken Link Exploit
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 Broken Link Exploit
http://marc.info/?l=qemu-devel&m=124324043812915 Mailing List
http://rhn.redhat.com/errata/RHEA-2009-1272.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/10/16/5 Mailing List Patch
http://www.openwall.com/lists/oss-security/2009/10/16/8 Mailing List Patch
http://www.securityfocus.com/bid/36716 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=501131 Issue Tracking Patch
https://bugzilla.redhat.com/show_bug.cgi?id=505641 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=508567 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 - Broken Link, Exploit () http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 - Broken Link, Exploit
References () http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 - Broken Link, Exploit () http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 - Broken Link, Exploit
References () http://marc.info/?l=qemu-devel&m=124324043812915 - Mailing List () http://marc.info/?l=qemu-devel&m=124324043812915 - Mailing List
References () http://rhn.redhat.com/errata/RHEA-2009-1272.html - Third Party Advisory () http://rhn.redhat.com/errata/RHEA-2009-1272.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2009/10/16/5 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2009/10/16/5 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2009/10/16/8 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2009/10/16/8 - Mailing List, Patch
References () http://www.securityfocus.com/bid/36716 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/36716 - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=501131 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=501131 - Issue Tracking, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=505641 - Exploit, Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=505641 - Exploit, Issue Tracking
References () https://bugzilla.redhat.com/show_bug.cgi?id=508567 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=508567 - Issue Tracking

15 Feb 2024, 21:06

Type Values Removed Values Added
References (CONFIRM) http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 - Exploit (CONFIRM) http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 - Broken Link, Exploit
References (CONFIRM) http://rhn.redhat.com/errata/RHEA-2009-1272.html - (CONFIRM) http://rhn.redhat.com/errata/RHEA-2009-1272.html - Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=505641 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=505641 - Exploit, Issue Tracking
References (BID) http://www.securityfocus.com/bid/36716 - (BID) http://www.securityfocus.com/bid/36716 - Broken Link, Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2009/10/16/8 - (MLIST) http://www.openwall.com/lists/oss-security/2009/10/16/8 - Mailing List, Patch
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=501131 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=501131 - Issue Tracking, Patch
References (CONFIRM) http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 - Exploit (CONFIRM) http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 - Broken Link, Exploit
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=508567 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=508567 - Issue Tracking
References (MLIST) http://marc.info/?l=qemu-devel&m=124324043812915 - (MLIST) http://marc.info/?l=qemu-devel&m=124324043812915 - Mailing List
References (MLIST) http://www.openwall.com/lists/oss-security/2009/10/16/5 - (MLIST) http://www.openwall.com/lists/oss-security/2009/10/16/5 - Mailing List, Patch
CPE cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
CWE CWE-399 CWE-416
First Time Redhat
Redhat enterprise Linux Workstation
Redhat enterprise Linux Server
CVSS v2 : 8.5
v3 : unknown
v2 : 8.5
v3 : 9.9

Information

Published : 2009-10-23 18:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3616

Mitre link : CVE-2009-3616

CVE.ORG link : CVE-2009-3616


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_workstation

qemu

  • qemu
CWE
CWE-416

Use After Free