CVE-2015-3209
15.06.2015, 15:59
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 𝑥 ≤ 2.3.1 |
juniper | junos_space | 𝑥 ≤ 15.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.10 |
canonical | ubuntu_linux | 15.04 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_eus | 6.6 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server_aus | 6.6 |
redhat | enterprise_linux_server_tus | 6.6 |
redhat | enterprise_linux_workstation | 5.0 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | openstack | 5.0 |
redhat | virtualization | 3.0 |
arista | eos | 4.12 |
arista | eos | 4.13 |
arista | eos | 4.14 |
arista | eos | 4.15 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||||
xen |
|

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||
qemu-kvm |
| ||||||||
xen |
|
Common Weakness Enumeration
References