Qemu pcnet controller heap buffer overflow Arbitrary Code Execution Vulnerability (CVE-2015-3209)
Qemu pcnet controller heap buffer overflow Arbitrary Code Execution Vulnerability (CVE-2015-3209)
Release date:
Updated on:
Affected Systems:
QEMU
Description:
CVE (CAN) ID: CVE-2015-3209
QEMU is an open source simulator software.
The qemu pcnet controller has the heap buffer overflow vulnerability. Remote attackers can exploit this vulnerability to execute arbitrary code by sending TXSTATUS_STARTPACKET data packets and then sending malformed data packets with TXSTATUS_DEVICEOWNS configured.
<* Source: Matt Tait
*>
Suggestion:
Vendor patch:
QEMU
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://fabrice.bellard.free.fr/qemu/
Linux getting started Tutorial: QEMU for Virtual Machine experience
Ubuntu 12.04 cannot find the Qemu command
Install QEMU + efi bios on Arch Linux
QEMU translation framework and debugging tools
QEMU code analysis: BIOS loading process
QEMU details: click here
QEMU: click here
This article permanently updates the link address: