CVE-2015-5279

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

History

13 Feb 2023, 00:52

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1256672', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1256672', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1925', 'name': 'https://access.redhat.com/errata/RHSA-2015:1925', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1924', 'name': 'https://access.redhat.com/errata/RHSA-2015:1924', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:2065', 'name': 'https://access.redhat.com/errata/RHSA-2015:2065', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1923', 'name': 'https://access.redhat.com/errata/RHSA-2015:1923', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2015-5279', 'name': 'https://access.redhat.com/security/cve/CVE-2015-5279', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1896', 'name': 'https://access.redhat.com/errata/RHSA-2015:1896', 'tags': [], 'refsource': 'MISC'}
Summary A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

02 Feb 2023, 16:17

Type Values Removed Values Added
Summary Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets. A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host.
References
  • {'url': 'http://git.qemu.org/?p=qemu.git;a=commit;h=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755', 'name': 'http://git.qemu.org/?p=qemu.git;a=commit;h=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755', 'tags': [], 'refsource': 'CONFIRM'}
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1256672 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1925 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1924 -
  • (MISC) http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:2065 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1923 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2015-5279 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1896 -

17 Nov 2021, 22:15

Type Values Removed Values Added
References
  • (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14 -

10 Nov 2021, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14', 'name': 'https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14', 'tags': [], 'refsource': 'MISC'}

05 Nov 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14 -

Information

Published : 2015-09-28 16:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-5279

Mitre link : CVE-2015-5279

CVE.ORG link : CVE-2015-5279


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer