7.5
CVSSv2

CVE-2015-3209

Published: 15/06/2015 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the PCNET controller in QEMU allows remote malicious users to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

juniper junos space

canonical ubuntu linux 14.10

canonical ubuntu linux 15.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

debian debian linux 8.0

debian debian linux 7.0

redhat enterprise linux server 5.0

redhat enterprise linux workstation 5.0

redhat enterprise linux server aus 6.6

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux eus 6.6

redhat enterprise linux server tus 6.6

redhat openstack 5.0

redhat virtualization 3.0

fedoraproject fedora 22

fedoraproject fedora 20

fedoraproject fedora 21

suse linux enterprise server 11

suse linux enterprise desktop 11

suse linux enterprise debuginfo 11

suse linux enterprise software development kit 11

suse linux enterprise server 10

suse linux enterprise server 12

suse linux enterprise software development kit 12

suse linux enterprise desktop 12

arista eos 4.15

arista eos 4.14

arista eos 4.13

arista eos 4.12

Vendor Advisories

Several security issues were fixed in QEMU ...
Debian Bug report logs - #787547 CVE-2015-4103 CVE-2015-4104 CVE-2015-4105 CVE-2015-4106 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 2 Jun 2015 17:03:01 UTC Severity: grave Tags: fixed-upstream, p ...
Debian Bug report logs - #788460 qemu: CVE-2015-3209: heap overflow in QEMU PCNET controller (allowing guest->host escape) Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 11 Jun 2015 16:09:02 UT ...
Multiple security issues have been found in the Xen virtualisation solution: CVE-2015-3209 Matt Tait discovered a flaw in the way QEMU's AMD PCnet Ethernet emulation handles multi-TMD packets with a length above 4096 bytes A privileged guest user in a guest with an AMD PCNet ethernet card enabled can potentially use this flaw to e ...
A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process ...

References

CWE-787http://xenbits.xen.org/xsa/advisory-135.htmlhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698https://security.gentoo.org/glsa/201510-02http://www.securityfocus.com/bid/75123http://www.ubuntu.com/usn/USN-2630-1http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.htmlhttp://www.securitytracker.com/id/1032545http://www.debian.org/security/2015/dsa-3286http://rhn.redhat.com/errata/RHSA-2015-1089.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1088.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1087.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.htmlhttps://kb.juniper.net/JSA10783https://security.gentoo.org/glsa/201604-03http://www.debian.org/security/2015/dsa-3285http://www.debian.org/security/2015/dsa-3284http://rhn.redhat.com/errata/RHSA-2015-1189.htmlhttps://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13https://usn.ubuntu.com/2630-1/https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2015-3209