Podatność CVE-2015-8567


Publikacja: 2017-04-13

Opis:
Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).

Typ:

CWE-399

(Resource Management Errors)

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
6.8/10
6.9/10
8/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Niska
Jednorazowa
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Brak
Brak
Pełny
Affected software
QEMU -> QEMU 
Opensuse project -> Opensuse 
Opensuse -> LEAP 
Opensuse -> Opensuse 
Novell -> Suse linux enterprise desktop 
Novell -> Suse linux enterprise software development kit 
Novell -> Suse linux enterprise module for legacy software 
Novell -> LEAP 
Novell -> Suse linux enterprise server 
Fedoraproject -> Fedora 
Debian -> Debian linux 
Canonical -> Ubuntu linux 

 Referencje:
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html
http://www.debian.org/security/2016/dsa-3471
http://www.openwall.com/lists/oss-security/2015/12/15/10
http://www.securityfocus.com/bid/79721
http://www.ubuntu.com/usn/USN-2891-1
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
https://security.gentoo.org/glsa/201602-01

Copyright 2022, cxsecurity.com

 

Back to Top