9

CVE-2015-7512

Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.

Data is provided by the National Vulnerability Database (NVD)
QemuQemu Version <= 2.4.1
QemuQemu Version2.5.0 Updaterc0
QemuQemu Version2.5.0 Updaterc1
QemuQemu Version2.5.0 Updaterc2
RedhatEnterprise Linux Eus Version6.7
RedhatOpenstack Version5.0
   RedhatEnterprise Linux Server Version6.0
RedhatVirtualization Version3.0
   RedhatEnterprise Linux Server Version6.0
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
OracleLinux Version6 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 14.19% 0.942
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9 2.2 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.