First published: Wed May 13 2015(Updated: )
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.3.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat OpenStack for IBM Power | =4.0 | |
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Xen XAPI | =4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3456 is considered to have a medium severity level due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2015-3456, update QEMU to version 2.3.1 or later, or apply the relevant patches provided by your vendor.
Versions of QEMU up to and including 2.3.0 are affected by CVE-2015-3456.
CVE-2015-3456 impacts platforms using QEMU, including Xen 4.5.x and earlier, and various versions of Red Hat OpenStack and Enterprise Virtualization.
While CVE-2015-3456 primarily leads to denial of service, it has potential for arbitrary code execution under certain conditions.