First published: Fri Jan 08 2016(Updated: )
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.4.1 | |
QEMU KVM | =2.5.0-rc0 | |
QEMU KVM | =2.5.0-rc1 | |
QEMU KVM | =2.5.0-rc2 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.7 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat openstack | =5.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
redhat enterprise Linux server | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Oracle Linux | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7512 has a high severity due to its potential to cause a denial of service or allow remote code execution.
To fix CVE-2015-7512, upgrade to QEMU version 2.5.0-rc3 or later.
CVE-2015-7512 affects multiple versions of QEMU, specifically those up to version 2.4.1 and 2.5.0-rc0 to 2.5.0-rc2.
CVE-2015-7512 is a buffer overflow vulnerability located in the pcnet_receive function within QEMU.
Yes, CVE-2015-7512 can potentially allow attackers to execute arbitrary code, leading to data breaches.