Vulnerability Details : CVE-2015-5745
Potential exploit
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2015-5745
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5745
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5745
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2015-5745
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5745
-
https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
[Qemu-devel] [PULL 02/10] virtio-serial: fix ANY_LAYOUTMailing List;Patch;Third Party Advisory
-
https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Security Advisory 0013 - AristaThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
[SECURITY] Fedora 22 Update: xen-4.5.1-9.fc22Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
[SECURITY] Fedora 23 Update: xen-4.5.1-9.fc23Mailing List;Third Party Advisory
-
https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
virtio-serial: fix ANY_LAYOUT · qemu/qemu@7882080 · GitHubPatch;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
[SECURITY] Fedora 21 Update: xen-4.4.3-4.fc21Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/08/06/5
oss-security - Re: CVE request: Qemu: buffer overflow in virtio-serialExploit;Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/08/06/3
oss-security - CVE request: Qemu: buffer overflow in virtio-serialMailing List;Third Party Advisory
Jump to