CVE-2015-5225

Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

History

13 Feb 2023, 00:52

Type Values Removed Values Added
Summary A heap-based buffer overflow issue was found in the QEMU emulator's VNC display driver. It could occur while refreshing the VNC server's display surface using the vnc_refresh_server_surface() routine. A privileged guest user could use this flaw to corrupt the heap memory and crash the QEMU process instance, or to potentially use it to execute arbitrary code on the host. Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1772', 'name': 'https://access.redhat.com/errata/RHSA-2015:1772', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2015-5225', 'name': 'https://access.redhat.com/security/cve/CVE-2015-5225', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1837', 'name': 'https://access.redhat.com/errata/RHSA-2015:1837', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1255896', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1255896', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 15:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1772 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2015-5225 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1837 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1255896 -
Summary Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface. A heap-based buffer overflow issue was found in the QEMU emulator's VNC display driver. It could occur while refreshing the VNC server's display surface using the vnc_refresh_server_surface() routine. A privileged guest user could use this flaw to corrupt the heap memory and crash the QEMU process instance, or to potentially use it to execute arbitrary code on the host.

Information

Published : 2015-11-06 21:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-5225

Mitre link : CVE-2015-5225

CVE.ORG link : CVE-2015-5225


JSON object : View

Products Affected

redhat

  • openstack

fedoraproject

  • fedora

qemu

  • qemu
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer