First published: Mon Oct 16 2017(Updated: )
Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.4.1 | |
QEMU KVM | =2.5.0-rc0 | |
QEMU KVM | =2.5.0-rc1 | |
QEMU KVM | =2.5.0-rc2 | |
Xen xen-unstable | ||
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7504 has a high severity due to its potential for causing denial of service and executing arbitrary code.
To fix CVE-2015-7504, upgrade QEMU to versions later than 2.4.1 and include all security patches.
CVE-2015-7504 is caused by a heap-based buffer overflow in the pcnet_receive function within QEMU.
CVE-2015-7504 affects QEMU versions up to 2.4.1 and specific release candidates of version 2.5.0.
Yes, CVE-2015-7504 can potentially allow an attacker to execute arbitrary code through specially crafted packets.