7.5

CVE-2015-3209

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Data is provided by the National Vulnerability Database (NVD)
QemuQemu Version <= 2.3.1
JuniperJunos Space Version <= 15.1
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version14.10
CanonicalUbuntu Linux Version15.04
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
RedhatEnterprise Linux Eus Version6.6
RedhatOpenstack Version5.0
   RedhatEnterprise Linux Version6.0
RedhatVirtualization Version3.0
   RedhatEnterprise Linux Version6.0
FedoraprojectFedora Version20
FedoraprojectFedora Version21
FedoraprojectFedora Version22
SuseLinux Enterprise Debuginfo Version11 Updatesp2
SuseLinux Enterprise Desktop Version11 Updatesp3
SuseLinux Enterprise Desktop Version12 Update-
SuseLinux Enterprise Server Version10 Updatesp4 SwEditionltss
SuseLinux Enterprise Server Version11 Updatesp1 SwEditionltss
SuseLinux Enterprise Server Version11 Updatesp2 SwEditionltss
SuseLinux Enterprise Server Version11 Updatesp3 SwPlatform-
SuseLinux Enterprise Server Version12 Update-
AristaEos Version4.12
AristaEos Version4.13
AristaEos Version4.14
AristaEos Version4.15
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 5.35% 0.897
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

https://kb.juniper.net/JSA10783
Third Party Advisory
http://www.securityfocus.com/bid/75123
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1032545
Third Party Advisory
VDB Entry