Lucene search

K
freebsdFreeBSD2B3B4C27-B0C7-11E5-8D13-BC5FF45D0F28
HistoryAug 17, 2015 - 12:00 a.m.

qemu -- buffer overflow vulnerability in VNC

2015-08-1700:00:00
vuxml.freebsd.org
17

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

39.6%

Prasad J Pandit, Red Hat Product Security Team, reports:

Qemu emulator built with the VNC display driver support is
vulnerable to a buffer overflow flaw leading to a heap memory
corruption issue. It could occur while refreshing the server
display surface via routine vnc_refresh_server_surface().
A privileged guest user could use this flaw to corrupt the heap
memory and crash the Qemu process instance OR potentially use it
to execute arbitrary code on the host.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchqemu< 2.4.0.1UNKNOWN
FreeBSDanynoarchqemu-devel< 2.4.0.1UNKNOWN
FreeBSDanynoarchqemu-sbruno< 2.4.50.g20151011UNKNOWN
FreeBSDanynoarchqemu-user-static< 2.4.50.g20151011UNKNOWN

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

39.6%