Buffer overflow in QEMU - CVE-2015-5225
Published: August 5, 2020
Vulnerability identifier: #VU33990
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-5225
CWE-ID: CWE-119
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
QEMU
QEMU
Software vendor:
QEMU
QEMU
Description
The vulnerability allows a remote attacker to execute arbitrary code on the hypervisor.
Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.Remediation
Install updates from vendor's website.
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html
- http://rhn.redhat.com/errata/RHSA-2015-1772.html
- http://rhn.redhat.com/errata/RHSA-2015-1837.html
- http://www.debian.org/security/2015/dsa-3348
- http://www.openwall.com/lists/oss-security/2015/08/21/6
- http://www.securityfocus.com/bid/76506
- http://www.securitytracker.com/id/1033547
- https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- https://security.gentoo.org/glsa/201602-01