Severity
7.5HIGHNVD
EPSS
20.6%
top 4.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateMay 13

Description

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages15 packages

Debianqemu/qemu< 1:2.3+dfsg-6+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.13
NVDqemu/qemu2.3.1
Debianxen/xen< 4.4.0-1+3

Also affects: Debian Linux 7.0, 8.0, Fedora 20, 21, 22, Ubuntu Linux 12.04, 14.04, 14.10, 15.04, Enterprise Linux 6.6

🔴Vulnerability Details

4
GHSA
GHSA-f8hq-r3jp-2m27: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPA2022-05-13
OSV
CVE-2015-3209: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPA2015-06-15
CVEList
CVE-2015-3209: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPA2015-06-15
OSV
qemu, qemu-kvm vulnerabilities2015-06-10

📋Vendor Advisories

3
Red Hat
qemu: pcnet: multi-tmd buffer overflow in the tx path2015-06-10
Ubuntu
QEMU vulnerabilities2015-06-10
Debian
CVE-2015-3209: qemu - Heap-based buffer overflow in the PCNET controller in QEMU allows remote attacke...2015

💬Community

4
Bugzilla
CVE-2015-3209 xen: qemu: pcnet: multi-tmd buffer overflow in the tx path [fedora-all]2015-06-11
Bugzilla
CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path [fedora-all]2015-06-11
Bugzilla
CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path [epel-7]2015-06-11
Bugzilla
CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path2015-05-28
CVE-2015-3209 — Out-of-bounds Write in Qemu | cvebase