CVE-2015-3209

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
qemuqemu
𝑥
≤ 2.3.1
juniperjunos_space
𝑥
≤ 15.1
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
canonicalubuntu_linux
15.04
debiandebian_linux
7.0
debiandebian_linux
8.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
6.6
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server_aus
6.6
redhatenterprise_linux_server_tus
6.6
redhatenterprise_linux_workstation
5.0
redhatenterprise_linux_workstation
6.0
redhatopenstack
5.0
redhatvirtualization
3.0
aristaeos
4.12
aristaeos
4.13
aristaeos
4.14
aristaeos
4.15
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
xen
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
vivid
Fixed 1:2.2+dfsg-5expubuntu9.2
released
utopic
Fixed 2.1+dfsg-4ubuntu6.7
released
trusty
Fixed 2.0.0+dfsg-2ubuntu1.13
released
precise
dne
qemu-kvm
vivid
dne
utopic
dne
trusty
dne
precise
Fixed 1.0+noroms-0ubuntu14.23
released
xen
vivid
not-affected
utopic
ignored
trusty
Fixed 4.4.2-0ubuntu0.14.04.2
released
precise
Fixed 4.1.6.1-0ubuntu0.12.04.6
released
References