Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
References
Configurations
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 - Broken Link, Exploit | |
References | () http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 - Broken Link, Exploit | |
References | () http://marc.info/?l=qemu-devel&m=124324043812915 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHEA-2009-1272.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/10/16/5 - Mailing List, Patch | |
References | () http://www.openwall.com/lists/oss-security/2009/10/16/8 - Mailing List, Patch | |
References | () http://www.securityfocus.com/bid/36716 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=501131 - Issue Tracking, Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=505641 - Exploit, Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=508567 - Issue Tracking |
15 Feb 2024, 21:06
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 - Broken Link, Exploit | |
References | (CONFIRM) http://rhn.redhat.com/errata/RHEA-2009-1272.html - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=505641 - Exploit, Issue Tracking | |
References | (BID) http://www.securityfocus.com/bid/36716 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2009/10/16/8 - Mailing List, Patch | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=501131 - Issue Tracking, Patch | |
References | (CONFIRM) http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 - Broken Link, Exploit | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=508567 - Issue Tracking | |
References | (MLIST) http://marc.info/?l=qemu-devel&m=124324043812915 - Mailing List | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2009/10/16/5 - Mailing List, Patch | |
CPE | cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* |
CWE | CWE-416 | |
First Time |
Redhat
Redhat enterprise Linux Workstation Redhat enterprise Linux Server |
|
CVSS |
v2 : v3 : |
v2 : 8.5
v3 : 9.9 |
Information
Published : 2009-10-23 18:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3616
Mitre link : CVE-2009-3616
CVE.ORG link : CVE-2009-3616
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_workstation
qemu
- qemu
CWE
CWE-416
Use After Free