CVE-2015-5165

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
xenxen
𝑥
≤ 4.5.0
xenxen
4.5.1
debiandebian_linux
7.0
debiandebian_linux
8.0
redhatopenstack
5.0
redhatopenstack
6.0
redhatvirtualization
3.0
redhatenterprise_linux_compute_node_eus
7.1
redhatenterprise_linux_compute_node_eus
7.2
redhatenterprise_linux_compute_node_eus
7.3
redhatenterprise_linux_compute_node_eus
7.4
redhatenterprise_linux_compute_node_eus
7.5
redhatenterprise_linux_compute_node_eus
7.6
redhatenterprise_linux_compute_node_eus
7.7
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
6.7
redhatenterprise_linux_eus_compute_node
6.7
redhatenterprise_linux_for_power_big_endian
6.0
redhatenterprise_linux_for_power_big_endian
7.0
redhatenterprise_linux_for_power_big_endian_eus
6.7_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.1_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.2_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.3_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.4_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.5_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.6_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.7_ppc64:_ppc64
redhatenterprise_linux_for_scientific_computing
6.0
redhatenterprise_linux_for_scientific_computing
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
7.7
redhatenterprise_linux_server_eus
7.1
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_eus
7.7
redhatenterprise_linux_server_eus_from_rhui
6.7
redhatenterprise_linux_server_from_rhui
6.0
redhatenterprise_linux_server_from_rhui
7.0
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_server_update_services_for_sap_solutions
7.2
redhatenterprise_linux_server_update_services_for_sap_solutions
7.3
redhatenterprise_linux_server_update_services_for_sap_solutions
7.4
redhatenterprise_linux_server_update_services_for_sap_solutions
7.6
redhatenterprise_linux_server_update_services_for_sap_solutions
7.7
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
aristaeos
4.12
aristaeos
4.13
aristaeos
4.14
aristaeos
4.15
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
wheezy
no-dsa
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
xen
bullseye
4.14.6-1
fixed
wheezy
no-dsa
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
vivid
Fixed 1:2.2+dfsg-5expubuntu9.4
released
utopic
ignored
trusty
Fixed 2.0.0+dfsg-2ubuntu1.17
released
precise
dne
qemu-kvm
vivid
dne
utopic
dne
trusty
dne
precise
Fixed 1.0+noroms-0ubuntu14.24
released
xen
vivid
not-affected
utopic
ignored
trusty
Fixed 4.4.2-0ubuntu0.14.04.2
released
precise
Fixed 4.1.6.1-0ubuntu0.12.04.6
released
References