QEMU Heap Buffer Overflow Vulnerability (CVE-2015-5225)
QEMU Heap Buffer Overflow Vulnerability (CVE-2015-5225)
Release date:
Updated on:
Affected Systems:
QEMU
Description:
Bugtraq id: 76506
CVE (CAN) ID: CVE-2015-5225
QEMU is an open source simulator software.
Qemu vnc shows that the driver has a heap buffer overflow vulnerability. This vulnerability is triggered when the vnc_refresh_server_surface () routine is used to refresh the VNC Server display. authorized client users can exploit this vulnerability to destroy heap memory, this causes the QEMU process to crash and may execute arbitrary code on the host.
<* Source: Qinghao Tang
*>
Suggestion:
Vendor patch:
QEMU
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html
Linux getting started Tutorial: QEMU for Virtual Machine experience
Ubuntu 12.04 cannot find the Qemu command
Install QEMU + efi bios on Arch Linux
QEMU translation framework and debugging tools
QEMU code analysis: BIOS loading process
QEMU details: click here
QEMU: click here
This article permanently updates the link address: