CVE-2015-7504
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
16/10/2017
Last modified:
20/04/2025
Description
Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.4.1 (including) | |
cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:* | ||
cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/30/2
- http://www.securityfocus.com/bid/78227
- http://www.securitytracker.com/id/1034268
- http://xenbits.xen.org/xsa/advisory-162.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
- https://security.gentoo.org/glsa/201602-01
- https://security.gentoo.org/glsa/201604-03
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://www.debian.org/security/2016/dsa-3469
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3471
- http://www.openwall.com/lists/oss-security/2015/11/30/2
- http://www.securityfocus.com/bid/78227
- http://www.securitytracker.com/id/1034268
- http://xenbits.xen.org/xsa/advisory-162.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
- https://security.gentoo.org/glsa/201602-01
- https://security.gentoo.org/glsa/201604-03