ID

VAR-201506-0038


CVE

CVE-2015-3209


TITLE

QEMU of PCNET Controller heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-003134

DESCRIPTION

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. Xen is a virtualization technology for the Linux kernel that allows multiple operating systems to run simultaneously. QEMU is prone to a heap-based buffer-overflow vulnerability. Failed attacks will cause denial-of-service conditions. QEMU (also known as Quick Emulator) is a set of analog processor software developed by French programmer Fabrice Bellard. The software has the characteristics of fast speed and cross-platform. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2015:1087-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1087.html Issue date: 2015-06-10 CVE Names: CVE-2015-3209 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. (CVE-2015-3209) Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3209 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVeHRmXlSAg2UNWIIRAkq5AKCeYGr9MG7Kdic1FVJZw2avAhO6eACdFG0W VCkW3jIuuaxOqeYM0s8u6ss= =+WsT -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . CVE-2015-4037 Kurt Seifried of Red Hat Product Security discovered that QEMU's user mode networking stack uses predictable temporary file names when the -smb option is used. An unprivileged user can use this flaw to cause a denial of service. CVE-2015-4103 Jan Beulich discovered that the QEMU Xen code does not properly restrict write access to the host MSI message data field, allowing a malicious guest to cause a denial of service. CVE-2015-4104 Jan Beulich discovered that the QEMU Xen code does not properly restrict access to PCI MSI mask bits, allowing a malicious guest to cause a denial of service. CVE-2015-4105 Jan Beulich reported that the QEMU Xen code enables logging for PCI MSI-X pass-through error messages, allowing a malicious guest to cause a denial of service. CVE-2015-4106 Jan Beulich discovered that the QEMU Xen code does not properly restrict write access to the PCI config space for certain PCI pass-through devices, allowing a malicious guest to cause a denial of service, obtain sensitive information or potentially execute arbitrary code. CVE-2015-4163 Jan Beulich discovered that a missing version check in the GNTTABOP_swap_grant_ref hypercall handler may result in denial of service. This only applies to Debian stable/jessie. CVE-2015-4164 Andrew Cooper discovered a vulnerability in the iret hypercall handler, which may result in denial of service. For the oldstable distribution (wheezy), these problems have been fixed in version 4.1.4-3+deb7u8. For the stable distribution (jessie), these problems have been fixed in version 4.4.1-9+deb8u1. CVE-2015-3209, CVE-2015-4103, CVE-2015-4104, CVE-2015-4105 and CVE-2015-4106 don't affect the Xen package in stable jessie, it uses the standard qemu package and has already been fixed in DSA-3284-1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your xen packages. Relevant releases/architectures: RHEV Agents (vdsm) - x86_64 3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201510-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: QEMU: Arbitrary code execution Date: October 31, 2015 Bugs: #551752, #555680, #556050, #556052 ID: 201510-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A heap-based buffer overflow in QEMU could result in execution of arbitrary code. Background ========== QEMU is a generic and open source machine emulator and virtualizer. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/qemu < 2.3.0-r4 >= 2.3.0-r4 Description =========== Heap-based buffer overflow has been found in QEMU's PCNET controller. Workaround ========== There is no known workaround at this time. Resolution ========== All QEMU users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.3.0-r4" References ========== [ 1 ] CVE-2015-3209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209 [ 2 ] CVE-2015-3214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3214 [ 3 ] CVE-2015-5154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154 [ 4 ] CVE-2015-5158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5158 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201510-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.97

sources: NVD: CVE-2015-3209 // JVNDB: JVNDB-2015-003134 // CNVD: CNVD-2015-03820 // BID: 75123 // VULHUB: VHN-81170 // PACKETSTORM: 132242 // PACKETSTORM: 132289 // PACKETSTORM: 132290 // PACKETSTORM: 132240 // PACKETSTORM: 134165

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03820

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:aristamodel:eosscope:eqversion:4.15

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:22

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.6

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:aristamodel:eosscope:eqversion:4.12

Trust: 1.0

vendor:aristamodel:eosscope:eqversion:4.13

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:3.0

Trust: 1.0

vendor:junipermodel:junos spacescope:lteversion:15.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:21

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:aristamodel:eosscope:eqversion:4.14

Trust: 1.0

vendor:qemumodel:qemuscope:lteversion:2.3.1

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:20

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:5.0

Trust: 1.0

vendor:susemodel:linux enterprise debuginfoscope:eqversion:11

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:fabrice bellardmodel:qemuscope: - version: -

Trust: 0.8

vendor:xenmodel:xenscope:lteversion:4.5.0

Trust: 0.8

vendor:xensourcemodel:xenscope:eqversion:4.2.x

Trust: 0.6

vendor:xensourcemodel:xenscope:eqversion:4.3.x

Trust: 0.6

vendor:xensourcemodel:xenscope:eqversion:4.4.x

Trust: 0.6

vendor:junipermodel:junos spacescope:eqversion:15.1

Trust: 0.6

vendor:xenmodel:xenscope:eqversion:4.5.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.3

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:14.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp3scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp1 ltssscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp4 ltssscope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:11

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:redhatmodel:openstack for rhelscope:eqversion:5.06

Trust: 0.3

vendor:redhatmodel:enterprise virtualizationscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux virtualization serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux server eus 6.6.zscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop multi os clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:qemumodel:qemuscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:junipermodel:northstar controller applicationscope:eqversion:2.1.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2.1

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.3

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.9.3

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.8.3

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.0.3

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:northstar controller application service packscope:neversion:2.1.01

Trust: 0.3

sources: CNVD: CNVD-2015-03820 // BID: 75123 // CNNVD: CNNVD-201506-282 // JVNDB: JVNDB-2015-003134 // NVD: CVE-2015-3209

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3209
value: HIGH

Trust: 1.0

NVD: CVE-2015-3209
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-03820
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201506-282
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81170
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-3209
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-03820
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-81170
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-03820 // VULHUB: VHN-81170 // CNNVD: CNNVD-201506-282 // JVNDB: JVNDB-2015-003134 // NVD: CVE-2015-3209

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-81170 // JVNDB: JVNDB-2015-003134 // NVD: CVE-2015-3209

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201506-282

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201506-282

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003134

PATCH

title:Top Pageurl:http://wiki.qemu.org/Main_Page

Trust: 0.8

title:JSA10698url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698

Trust: 0.8

title:XSA-135url:http://xenbits.xen.org/xsa/advisory-135.html

Trust: 0.8

title:Xen QEMU PCNET Controller Heap Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/59683

Trust: 0.6

title:xsa135-qemut-1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56387

Trust: 0.6

title:xsa135-qemuu-4.2-2url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56391

Trust: 0.6

title:xsa135-qemuu-4.5-2url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56395

Trust: 0.6

title:xsa135-qemuu-4.2-1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56390

Trust: 0.6

title:xsa135-qemuu-4.5-1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56394

Trust: 0.6

title:xsa135-qemuu-unstableurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=56389

Trust: 0.6

title:xsa135-qemuu-4.3-2url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56393

Trust: 0.6

title:xsa135-qemut-2url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56388

Trust: 0.6

title:xsa135-qemuu-4.3-1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=56392

Trust: 0.6

sources: CNVD: CNVD-2015-03820 // CNNVD: CNNVD-201506-282 // JVNDB: JVNDB-2015-003134

EXTERNAL IDS

db:NVDid:CVE-2015-3209

Trust: 3.9

db:BIDid:75123

Trust: 2.6

db:JUNIPERid:JSA10783

Trust: 2.0

db:SECTRACKid:1032545

Trust: 1.7

db:JUNIPERid:JSA10698

Trust: 1.7

db:JVNDBid:JVNDB-2015-003134

Trust: 0.8

db:CNNVDid:CNNVD-201506-282

Trust: 0.7

db:CNVDid:CNVD-2015-03820

Trust: 0.6

db:PACKETSTORMid:132290

Trust: 0.2

db:PACKETSTORMid:134165

Trust: 0.2

db:PACKETSTORMid:132240

Trust: 0.2

db:PACKETSTORMid:132289

Trust: 0.2

db:PACKETSTORMid:132242

Trust: 0.2

db:PACKETSTORMid:132447

Trust: 0.1

db:PACKETSTORMid:132241

Trust: 0.1

db:PACKETSTORMid:132251

Trust: 0.1

db:VULHUBid:VHN-81170

Trust: 0.1

sources: CNVD: CNVD-2015-03820 // VULHUB: VHN-81170 // BID: 75123 // PACKETSTORM: 132242 // PACKETSTORM: 132289 // PACKETSTORM: 132290 // PACKETSTORM: 132240 // PACKETSTORM: 134165 // CNNVD: CNNVD-201506-282 // JVNDB: JVNDB-2015-003134 // NVD: CVE-2015-3209

REFERENCES

url:http://xenbits.xen.org/xsa/advisory-135.html

Trust: 2.6

url:http://rhn.redhat.com/errata/rhsa-2015-1087.html

Trust: 2.1

url:http://rhn.redhat.com/errata/rhsa-2015-1088.html

Trust: 2.1

url:http://rhn.redhat.com/errata/rhsa-2015-1089.html

Trust: 2.0

url:https://security.gentoo.org/glsa/201510-02

Trust: 1.8

url:http://www.securitytracker.com/id/1032545

Trust: 1.7

url:http://www.securityfocus.com/bid/75123

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3284

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3285

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3286

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160669.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160685.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160677.html

Trust: 1.7

url:https://security.gentoo.org/glsa/201604-03

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1189.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2630-1

Trust: 1.7

url:https://kb.juniper.net/jsa10783

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10698

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3209

Trust: 1.4

url:https://bugzilla.redhat.com/show_bug.cgi?id=1225882

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2015-3209

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3209

Trust: 0.8

url:https://access.redhat.com/errata/rhsa-2015:1189

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2015:1088

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2015:1089

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2015:1087

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-3209

Trust: 0.5

url:https://www.mail-archive.com/qemu-devel@nongnu.org/msg302403.html

Trust: 0.3

url:http://wiki.qemu.org/main_page

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10783&cat=sirt_1&actp=list

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/101011972

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4105

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4164

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4106

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4163

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4104

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3214

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5154

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3214

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5158

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3209

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5158

Trust: 0.1

sources: CNVD: CNVD-2015-03820 // VULHUB: VHN-81170 // BID: 75123 // PACKETSTORM: 132242 // PACKETSTORM: 132289 // PACKETSTORM: 132290 // PACKETSTORM: 132240 // PACKETSTORM: 134165 // CNNVD: CNNVD-201506-282 // JVNDB: JVNDB-2015-003134 // NVD: CVE-2015-3209

CREDITS

Matt Tait of Google's Project Zero security team.

Trust: 0.3

sources: BID: 75123

SOURCES

db:CNVDid:CNVD-2015-03820
db:VULHUBid:VHN-81170
db:BIDid:75123
db:PACKETSTORMid:132242
db:PACKETSTORMid:132289
db:PACKETSTORMid:132290
db:PACKETSTORMid:132240
db:PACKETSTORMid:134165
db:CNNVDid:CNNVD-201506-282
db:JVNDBid:JVNDB-2015-003134
db:NVDid:CVE-2015-3209

LAST UPDATE DATE

2026-03-26T20:02:38.773000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03820date:2015-06-17T00:00:00
db:VULHUBid:VHN-81170date:2023-02-13T00:00:00
db:BIDid:75123date:2017-04-18T00:05:00
db:CNNVDid:CNNVD-201506-282date:2023-04-10T00:00:00
db:JVNDBid:JVNDB-2015-003134date:2015-10-21T00:00:00
db:NVDid:CVE-2015-3209date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03820date:2015-06-17T00:00:00
db:VULHUBid:VHN-81170date:2015-06-15T00:00:00
db:BIDid:75123date:2015-06-10T00:00:00
db:PACKETSTORMid:132242date:2015-06-10T23:39:22
db:PACKETSTORMid:132289date:2015-06-15T15:43:00
db:PACKETSTORMid:132290date:2015-06-15T15:43:07
db:PACKETSTORMid:132240date:2015-06-10T23:36:31
db:PACKETSTORMid:134165date:2015-11-02T16:49:11
db:CNNVDid:CNNVD-201506-282date:2015-06-16T00:00:00
db:JVNDBid:JVNDB-2015-003134date:2015-06-18T00:00:00
db:NVDid:CVE-2015-3209date:2015-06-15T15:59:00.070