CVE-2015-7295Improper Restriction of Operations within the Bounds of a Memory Buffer in Qemu

Severity
5.0MEDIUMNVD
EPSS
3.6%
top 12.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateMay 13

Description

hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.4+dfsg-4 (bookworm)
Debianqemu/qemu< 1:2.4+dfsg-4+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.21
NVDqemu/qemu2.4.1

Also affects: Debian Linux 7.0, 8.0, Fedora 21, 22

🔴Vulnerability Details

3
GHSA
GHSA-cw9m-9h89-prfq: hw/virtio/virtio2022-05-13
OSV
qemu, qemu-kvm vulnerabilities2015-12-03
OSV
CVE-2015-7295: hw/virtio/virtio2015-11-09

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2015-12-03
Red Hat
Qemu: net: virtio-net possible remote DoS2015-09-18
Debian
CVE-2015-7295: qemu - hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, w...2015

💬Community

1
Bugzilla
CVE-2015-7295 Qemu: net: virtio-net possible remote DoS2015-09-18