First published: Fri Nov 06 2015(Updated: )
Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
QEMU | <=2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5225 has a severity rating that indicates it could lead to denial of service and potential arbitrary code execution.
To fix CVE-2015-5225, update QEMU to version 2.4.0.1 or later.
CVE-2015-5225 affects several versions of QEMU, Red Hat OpenStack 5.0, 6.0, and 7.0, and Fedora versions 21, 22, and 23.
CVE-2015-5225 causes a buffer overflow leading to heap memory corruption and potential process crashes.
Yes, CVE-2015-5225 can be exploited by guest users to impact the host system.