Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2015-3209
Description:Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Test IDs: 1.3.6.1.4.1.25623.1.0.882211   1.3.6.1.4.1.25623.1.0.703284   1.3.6.1.4.1.25623.1.0.882196   1.3.6.1.4.1.25623.1.0.871374   1.3.6.1.4.1.25623.1.0.703285   1.3.6.1.4.1.25623.1.0.703286   1.3.6.1.4.1.25623.1.0.123104   1.3.6.1.4.1.25623.1.0.123089   1.3.6.1.4.1.25623.1.0.850828   1.3.6.1.4.1.25623.1.0.850745   1.3.6.1.4.1.25623.1.0.851043   1.3.6.1.4.1.25623.1.0.851096   1.3.6.1.4.1.25623.1.1.4.2015.1045.1   1.3.6.1.4.1.25623.1.1.4.2015.1643.1   1.3.6.1.4.1.25623.1.1.4.2015.1206.1   1.3.6.1.4.1.25623.1.1.4.2015.1157.1   1.3.6.1.4.1.25623.1.1.4.2015.1156.1   1.3.6.1.4.1.25623.1.1.4.2015.1152.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2015-3209
BugTraq ID: 75123
http://www.securityfocus.com/bid/75123
Debian Security Information: DSA-3284 (Google Search)
http://www.debian.org/security/2015/dsa-3284
Debian Security Information: DSA-3285 (Google Search)
http://www.debian.org/security/2015/dsa-3285
Debian Security Information: DSA-3286 (Google Search)
http://www.debian.org/security/2015/dsa-3286
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html
https://security.gentoo.org/glsa/201510-02
https://security.gentoo.org/glsa/201604-03
RedHat Security Advisories: RHSA-2015:1087
http://rhn.redhat.com/errata/RHSA-2015-1087.html
RedHat Security Advisories: RHSA-2015:1088
http://rhn.redhat.com/errata/RHSA-2015-1088.html
RedHat Security Advisories: RHSA-2015:1089
http://rhn.redhat.com/errata/RHSA-2015-1089.html
RedHat Security Advisories: RHSA-2015:1189
http://rhn.redhat.com/errata/RHSA-2015-1189.html
http://www.securitytracker.com/id/1032545
SuSE Security Announcement: SUSE-SU-2015:1042 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
SuSE Security Announcement: SUSE-SU-2015:1045 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
SuSE Security Announcement: SUSE-SU-2015:1152 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
SuSE Security Announcement: SUSE-SU-2015:1156 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
SuSE Security Announcement: SUSE-SU-2015:1157 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
SuSE Security Announcement: SUSE-SU-2015:1206 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html
SuSE Security Announcement: SUSE-SU-2015:1426 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
SuSE Security Announcement: SUSE-SU-2015:1519 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
SuSE Security Announcement: SUSE-SU-2015:1643 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
http://www.ubuntu.com/usn/USN-2630-1




© 1998-2024 E-Soft Inc. All rights reserved.