Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-5225 |
CWE-ID | CWE-119 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
Fedora Operating systems & Components / Operating system qemu Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33990
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-5225
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the hypervisor.
Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface. MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 23
qemu: before 2.4.0-2.fc23
CPE2.3 External linkshttps://bodhi.fedoraproject.org/updates/FEDORA-2015-14783
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.