CVE-2015-7504

Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2015-2694.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2695.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2696.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3469 Third Party Advisory
http://www.debian.org/security/2016/dsa-3470 Third Party Advisory
http://www.debian.org/security/2016/dsa-3471 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/11/30/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/78227 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034268 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-162.html Mitigation Patch Vendor Advisory
https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html Mailing List Patch Third Party Advisory
https://security.gentoo.org/glsa/201602-01 Patch Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201604-03 Patch Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2015-2694.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2695.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2696.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3469 Third Party Advisory
http://www.debian.org/security/2016/dsa-3470 Third Party Advisory
http://www.debian.org/security/2016/dsa-3471 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/11/30/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/78227 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034268 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-162.html Mitigation Patch Vendor Advisory
https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html Mailing List Patch Third Party Advisory
https://security.gentoo.org/glsa/201602-01 Patch Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201604-03 Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2015-2694.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-2694.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-2695.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-2695.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-2696.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-2696.html - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3469 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3469 - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3470 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3470 - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3471 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3471 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/11/30/2 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/11/30/2 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/78227 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/78227 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034268 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034268 - Third Party Advisory, VDB Entry
References () http://xenbits.xen.org/xsa/advisory-162.html - Mitigation, Patch, Vendor Advisory () http://xenbits.xen.org/xsa/advisory-162.html - Mitigation, Patch, Vendor Advisory
References () https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html - Mailing List, Patch, Third Party Advisory () https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html - Mailing List, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201602-01 - Patch, Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201602-01 - Patch, Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201604-03 - Patch, Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201604-03 - Patch, Third Party Advisory, VDB Entry

Information

Published : 2017-10-16 20:29

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7504

Mitre link : CVE-2015-7504

CVE.ORG link : CVE-2015-7504


JSON object : View

Products Affected

debian

  • debian_linux

xen

  • xen

qemu

  • qemu
CWE
CWE-787

Out-of-bounds Write