First published: Mon Sep 28 2015(Updated: )
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5279 has a medium severity rating due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2015-5279, upgrade QEMU to version 2.4.0.1 or later.
CVE-2015-5279 is caused by a heap-based buffer overflow in the ne2000_receive function in QEMU.
Users of QEMU versions prior to 2.4.0.1 are affected by CVE-2015-5279.
If CVE-2015-5279 is exploited, it can lead to instance crashes or allow attackers to execute arbitrary code.