QEMU pcnet_receive Heap Buffer Overflow Vulnerability (CVE-2015-7504)
QEMU pcnet_receive Heap Buffer Overflow Vulnerability (CVE-2015-7504)
Release date:
Updated on:
Affected Systems:
QEMU
Description:
CVE (CAN) ID: CVE-2015-7504
QEMU is an open source simulator software.
The Qemu of the amd pc-Net II Ethernet Controller is enabled with the heap buffer overflow vulnerability. When receiving data packets in the send-back mode, the CRC code is appended to the receiving buffer. If the size of the received data is equal to the size of the receiving buffer, the attached CRC code overwrites four bytes outside the's-> buffer array, causing the Qemu instance to crash, resulting in DOS and even arbitrary code execution.
<* Source: Qinghao Tang
Ling Liu
*>
Suggestion:
Vendor patch:
QEMU
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
Use KVM + Qemu to build a virtual machine in Ubuntu
Linux getting started Tutorial: QEMU for Virtual Machine experience
Ubuntu 12.04 cannot find the Qemu command
Install QEMU + efi bios on Arch Linux
QEMU translation framework and debugging tools
QEMU code analysis: BIOS loading process
QEMU details: click here
QEMU: click here
This article permanently updates the link address: