CVE-2015-5239

CWE-83510 documents8 sources
Severity
6.5MEDIUM
EPSS
5.1%
top 10.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 23
Latest updateMay 24

Description

Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages9 packages

NVDqemu/qemu< 2.1.0
Debianqemu< 2.1+dfsg-1+3
Ubuntuqemu< 2.0.0+dfsg-2ubuntu1.19
CVEListV5qemu/qemubefore 2.1.0
NVDarista/eos4 versions+3

Also affects: Fedora 21, 22, 23, Ubuntu Linux 12.04, 14.04, 15.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-9mm7-7f84-98c9: Integer overflow in the VNC display driver in QEMU before 22022-05-24
CVEList
CVE-2015-5239: Integer overflow in the VNC display driver in QEMU before 22020-01-23
OSV
CVE-2015-5239: Integer overflow in the VNC display driver in QEMU before 22020-01-23
OSV
qemu, qemu-kvm vulnerabilities2015-09-24

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2015-09-24
Debian
CVE-2015-5239: qemu - Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers...2015
Red Hat
qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg()2014-06-30

💬Community

2
Bugzilla
CVE-2015-5239 xen: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() [fedora-all]2015-09-02
Bugzilla
CVE-2015-5239 qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg()2015-08-27