Vulnerabilities > CVE-2015-3456 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
qemu
redhat
xen
CWE-119
nessus
exploit available

Summary

The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.

Vulnerable Configurations

Part Description Count
Application
Qemu
189
Application
Redhat
5
OS
Redhat
3
OS
Xen
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Exploit-Db

descriptionVENOM, Xen 4.5.x, QEMU. CVE-2015-3456. Dos exploits for multiple platform
fileexploits/multiple/dos/37053.c
idEDB-ID:37053
last seen2016-02-04
modified2015-05-18
platformmultiple
port
published2015-05-18
reporterMarcus Meissner
sourcehttps://www.exploit-db.com/download/37053/
titleQEMU - Floppy Disk Controller FDC PoC
typedos

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-8248.NASL
    description - CVE-2015-3456: (VENOM) fdc: out-of-bounds fifo buffer memory access (bz #1221152) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-26
    plugin id83791
    published2015-05-26
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83791
    titleFedora 20 : qemu-1.6.2-14.fc20 (2015-8248) (Venom)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2015-8248.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(83791);
      script_version("2.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-3456");
      script_xref(name:"FEDORA", value:"2015-8248");
    
      script_name(english:"Fedora 20 : qemu-1.6.2-14.fc20 (2015-8248) (Venom)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - CVE-2015-3456: (VENOM) fdc: out-of-bounds fifo buffer
        memory access (bz #1221152)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1218611"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2015-May/158348.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ae71940d"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected qemu package.");
      script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:qemu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/05/15");
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/05/26");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"qemu-1.6.2-14.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "qemu");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-8194.NASL
    descriptionPrivilege escalation via emulated floppy disk drive [XSA-133, CVE-2015-3456] (#1221153) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-27
    plugin id83828
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83828
    titleFedora 22 : xen-4.5.0-9.fc22 (2015-8194) (Venom)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2015-8194.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(83828);
      script_version("2.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-3456");
      script_xref(name:"FEDORA", value:"2015-8194");
    
      script_name(english:"Fedora 22 : xen-4.5.0-9.fc22 (2015-8194) (Venom)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Privilege escalation via emulated floppy disk drive [XSA-133,
    CVE-2015-3456] (#1221153)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1218611"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2015-May/158648.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?1d82eb7a"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected xen package.");
      script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xen");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:22");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/05/14");
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/05/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^22([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 22.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC22", reference:"xen-4.5.0-9.fc22")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xen");
    }
    
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0059.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - force the fifo access to be in bounds of the allocated buffer This is XSA-133. [bug 21078975] (CVE-2015-3456)
    last seen2020-06-01
    modified2020-06-02
    plugin id83484
    published2015-05-15
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83484
    titleOracleVM 2.2 : xen (OVMSA-2015-0059) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-363.NASL
    descriptionqemu was updated to fix a security issue : - CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used to denial of service attacks or potential code execution against the host.
    last seen2020-06-05
    modified2015-05-19
    plugin id83533
    published2015-05-19
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83533
    titleopenSUSE Security Update : qemu (openSUSE-2015-363) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0943-1.NASL
    descriptionKVM was updated to fix the following issues : CVE-2015-3456: A buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. Validate VMDK4 version field so we don
    last seen2020-06-01
    modified2020-06-02
    plugin id83858
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83858
    titleSUSE SLES11 Security Update : KVM (SUSE-SU-2015:0943-1) (Venom)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-8249.NASL
    description - CVE-2015-3456: (VENOM) fdc: out-of-bounds fifo buffer memory access (bz #1221152) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-18
    plugin id83506
    published2015-05-18
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83506
    titleFedora 21 : qemu-2.1.3-7.fc21 (2015-8249) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0923-1.NASL
    descriptionXEN was updated to fix two security issues and bugs. Security issues fixed : - CVE-2015-3340: Xen did not initialize certain fields, which allowed certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. - CVE-2015-2751: Xen, when using toolstack disaggregation, allowed remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations. - CVE-2015-2752: The XEN_DOMCTL_memory_mapping hypercall in Xen, when using a PCI passthrough device, was not preemptable, which allowed local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm). - CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used to denial of service attacks or potential code execution against the host. Bugs fixed : - xentop: Fix memory leak on read failure Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id83757
    published2015-05-21
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83757
    titleSUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2015:0923-1) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0927-1.NASL
    descriptionXen was updated to fix two security issues and a bug : CVE-2015-3456: A buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. CVE-2015-3340: Xen did not initialize certain fields, which allowed certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. An exception in setCPUAffinity when restoring guests. (bsc#910441) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id83853
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83853
    titleSUSE SLED11 / SLES11 Security Update : Xen (SUSE-SU-2015:0927-1) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-550.NASL
    description - Version bump to 4.2.32 bnc#938408 CVE-2015-2594 - Storage: fixed a crash when taking snapshots (4.2.30 regression) - ExtPack: don
    last seen2020-06-05
    modified2015-08-19
    plugin id85525
    published2015-08-19
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85525
    titleopenSUSE Security Update : virtualbox (openSUSE-2015-550) (Venom)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1001.NASL
    descriptionUpdated qemu-kvm-rhev packages that fix one security issue are now available for Red Hat Enterprise Virtualization 3.5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83428
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83428
    titleRHEL 6 : qemu-kvm-rhev (RHSA-2015:1001) (Venom)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1000.NASL
    descriptionUpdated qemu-kvm-rhev packages that fix one security issue are now available for Red Hat Enterprise Virtualization Hypervisor 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83427
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83427
    titleRHEL 7 : qemu-kvm-rhev (RHSA-2015:1000) (Venom)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1003.NASL
    descriptionUpdated kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83421
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83421
    titleCentOS 5 : kvm (CESA-2015:1003) (Venom)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_2780E442FC5911E4B18B6805CA1D3BB1.NASL
    descriptionJason Geffner, CrowdStrike Senior Security Researcher reports : VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host
    last seen2020-06-01
    modified2020-06-02
    plugin id83510
    published2015-05-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83510
    titleFreeBSD : qemu, xen and VirtualBox OSE -- possible VM escape and code execution ('VENOM
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0068.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2015-0068 for details.
    last seen2020-06-01
    modified2020-06-02
    plugin id84140
    published2015-06-12
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84140
    titleOracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2608-1.NASL
    descriptionJason Geffner discovered that QEMU incorrectly handled the virtual floppy driver. This issue is known as VENOM. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. (CVE-2015-3456) Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets. A remote attacker could use this issue to cause QEMU to consume memory, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779) Jan Beulich discovered that QEMU, when used with Xen, didn
    last seen2020-06-01
    modified2020-06-02
    plugin id83435
    published2015-05-13
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83435
    titleUbuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : qemu, qemu-kvm vulnerabilities (USN-2608-1) (Venom)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-249.NASL
    descriptionA vulnerability was discovered in the qemu virtualisation solution : CVE-2015-3456 Jason Geffner discovered a buffer overflow in the emulated floppy disk drive, resulting in the potential execution of arbitrary code. Despite the end-of-life of qemu-kvm support in the old-oldstable distribution (squeeze-lts), this problem has been fixed in version 0.12.5+dfsg-5+squeeze11 of the qemu-kvm source package due to its severity (the so-called VENOM vulnerability). Further problems may still be present in the qemu-kvm package in the old-oldstable distribution (squeeze-lts) and users who need to rely on qemu-kvm are encouraged to upgrade to a newer version of Debian. We recommend that you upgrade your qemu-kvm packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-06-22
    plugin id84295
    published2015-06-22
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84295
    titleDebian DLA-249-1 : qemu-kvm security update (Venom)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL16620.NASL
    descriptionAn out-of-bounds memory access flaw, also known as
    last seen2020-06-01
    modified2020-06-02
    plugin id83749
    published2015-05-21
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83749
    titleF5 Networks BIG-IP : QEMU vulnerability (SOL16620) (Venom)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-0998.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83418
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83418
    titleCentOS 6 : qemu-kvm (CESA-2015:0998) (Venom)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0998.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83425
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83425
    titleRHEL 6 : qemu-kvm (RHSA-2015:0998) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-434.NASL
    descriptionXen was updated to 4.4.2 to fix multiple vulnerabilities and non-security bugs. The following vulnerabilities were fixed : - CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (boo#931625) - CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (boo#931626) - CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (boo#931627) - CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (boo#931628) - CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (boo#932996) - CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (boo#932790) - CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (boo#932770) - CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used to denial of service attacks or potential code execution against the host. () - CVE-2015-3340: Xen did not initialize certain fields, which allowed certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. () - CVE-2015-2752: Long latency MMIO mapping operations are not preemptible (XSA-125 boo#922705) - CVE-2015-2756: Unmediated PCI command register access in qemu (XSA-126 boo#922706) - CVE-2015-2751: Certain domctl operations may be abused to lock up the host (XSA-127 boo#922709) - CVE-2015-2151: Hypervisor memory corruption due to x86 emulator flaw (boo#919464 XSA-123) - CVE-2015-2045: Information leak through version information hypercall (boo#918998 XSA-122) - CVE-2015-2044: Information leak via internal x86 system device emulation (boo#918995 (XSA-121) - CVE-2015-2152: HVM qemu unexpectedly enabling emulated VGA graphics backends (boo#919663 XSA-119) - CVE-2014-3615: information leakage when guest sets high resolution (boo#895528) The following non-security bugs were fixed : - xentop: Fix memory leak on read failure - boo#923758: xen dmesg contains bogus output in early boot - boo#921842: Xentop doesn
    last seen2020-06-05
    modified2015-06-23
    plugin id84333
    published2015-06-23
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84333
    titleopenSUSE Security Update : xen (openSUSE-2015-434) (Venom)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-0999.NASL
    descriptionFrom Red Hat Security Advisory 2015:0999 : Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83445
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83445
    titleOracle Linux 7 : qemu-kvm (ELSA-2015-0999) (Venom)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1003.NASL
    descriptionFrom Red Hat Security Advisory 2015:1003 : Updated kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83447
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83447
    titleOracle Linux 5 : kvm (ELSA-2015-1003) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-391.NASL
    descriptionThe XEN hypervisor was updated to fix two security issues : - Fixed a buffer overflow in the floppy drive emulation, which could be used to denial of service attacks or potential code execution against the host. (CVE-2015-3456) - Xen did not initialize certain fields, which allowed certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. (CVE-2015-3340)
    last seen2020-06-05
    modified2015-06-03
    plugin id83965
    published2015-06-03
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83965
    titleopenSUSE Security Update : xen (openSUSE-2015-391) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-364.NASL
    descriptionQemu was updated to v2.1.3: See http://wiki.qemu-project.org/ChangeLog/2.1 for more information. This update includes a security fix : - CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used to denial of service attacks or potential code execution against the host.
    last seen2020-06-05
    modified2015-05-19
    plugin id83534
    published2015-05-19
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83534
    titleopenSUSE Security Update : qemu (openSUSE-2015-364) (Venom)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-8270.NASL
    descriptionPrivilege escalation via emulated floppy disk drive [XSA-133, CVE-2015-3456] (#1221153) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-27
    plugin id83834
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83834
    titleFedora 21 : xen-4.4.2-4.fc21 (2015-8270) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0889-2.NASL
    descriptionXen was updated to fix a buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. (CVE-2015-3456) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id83852
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83852
    titleSUSE SLES10 Security Update : Xen (SUSE-SU-2015:0889-2) (Venom)
  • NASL familyWindows
    NASL idVIRTUALBOX_4_3_28.NASL
    descriptionThe remote host contains a version of Oracle VM VirtualBox that is prior to 3.2.28 / 4.0.30 / 4.1.38 / 4.2.30 / 4.3.28. It is, therefore affected by a flaw in the Floppy Disk Controller (FDC) in the bundled QEMU software due to an overflow condition in
    last seen2020-06-01
    modified2020-06-02
    plugin id83729
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83729
    titleOracle VM VirtualBox < 3.2.28 / 4.0.30 / 4.1.38 / 4.2.30 / 4.3.28 QEMU FDC Overflow RCE (VENOM)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201602-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201602-01 (QEMU: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in QEMU. Please review the CVE identifiers referenced below for details. Impact : A remote attacker might cause a Denial of Service or gain escalated privileges from a guest VM. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id88587
    published2016-02-05
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88587
    titleGLSA-201602-01 : QEMU: Multiple vulnerabilities (Venom)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201612-27.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201612-27 (VirtualBox: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details. Impact : Local attackers could cause a Denial of Service condition, execute arbitrary code, or escalate their privileges. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id95695
    published2016-12-12
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/95695
    titleGLSA-201612-27 : VirtualBox: Multiple vulnerabilities (Venom)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0057.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - fdc: force the fifo access to be in bounds of the allocated buffer During processing of certain commands such as FD_CMD_READ_ID and FD_CMD_DRIVE_SPECIFICATION_COMMAND the fifo memory access could get out of bounds leading to memory corruption with values coming from the guest. Fix this by making sure that the index is always bounded by the allocated memory. This is CVE-2015-3456. XSA-133 (CVE-2015-3456) - fdc: force the fifo access to be in bounds of the allocated buffer During processing of certain commands such as FD_CMD_READ_ID and FD_CMD_DRIVE_SPECIFICATION_COMMAND the fifo memory access could get out of bounds leading to memory corruption with values coming from the guest. Fix this by making sure that the index is always bounded by the allocated memory. This is CVE-2015-3456. XSA-133 (CVE-2015-3456) - domctl: don
    last seen2020-06-01
    modified2020-06-02
    plugin id83482
    published2015-05-15
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83482
    titleOracleVM 3.3 : xen (OVMSA-2015-0057) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0929-1.NASL
    descriptionKVM was updated to fix the following security issues : CVE-2015-3456: Buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c in QEMU allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image. CVE-2014-0223: Integer overflow in the qcow_open function in block/qcow.c in QEMU allowed local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id83854
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83854
    titleSUSE SLES11 Security Update : KVM (SUSE-SU-2015:0929-1) (Venom)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201604-03.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201604-03 (Xen: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. Impact : A local attacker could possibly cause a Denial of Service condition or obtain sensitive information. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id90380
    published2016-04-07
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/90380
    titleGLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1011.NASL
    descriptionUpdated rhev-hypervisor packages that fix one security issue are now available. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The rhev-hypervisor packages provide a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83536
    published2015-05-19
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83536
    titleRHEL 7 : rhev-hypervisor (RHSA-2015:1011) (Venom)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-0998.NASL
    descriptionFrom Red Hat Security Advisory 2015:0998 : Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83444
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83444
    titleOracle Linux 6 : qemu-kvm (ELSA-2015-0998) (Venom)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1002.NASL
    descriptionUpdated xen packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83420
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83420
    titleCentOS 5 : xen (CESA-2015:1002) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_KVM-150513.NASL
    descriptionKVM was updated to fix a buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. (CVE-2015-3456)
    last seen2020-06-01
    modified2020-06-02
    plugin id83515
    published2015-05-18
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83515
    titleSuSE 11.3 Security Update : KVM (SAT Patch Number 10672)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1031.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6.5 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83844
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83844
    titleRHEL 6 : qemu-kvm (RHSA-2015:1031) (Venom)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3274.NASL
    descriptionJason Geffner discovered a buffer overflow in the emulated floppy disk drive, resulting in potential privilege escalation.
    last seen2020-06-01
    modified2020-06-02
    plugin id83889
    published2015-05-29
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83889
    titleDebian DSA-3274-1 : virtualbox - security update (Venom)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150513_QEMU_KVM_ON_SL6_X.NASL
    descriptionAn out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-03-18
    modified2015-05-14
    plugin id83458
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83458
    titleScientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20150513) (Venom)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-0999.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83419
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83419
    titleCentOS 7 : qemu-kvm (CESA-2015:0999) (Venom)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-8220.NASL
    description - CVE-2015-3456: (VENOM) fdc: out-of-bounds fifo buffer memory access (bz #1221152) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-27
    plugin id83829
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83829
    titleFedora 22 : qemu-2.3.0-4.fc22 (2015-8220) (Venom)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1002.NASL
    descriptionUpdated xen packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83429
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83429
    titleRHEL 5 : xen (RHSA-2015:1002) (Venom)
  • NASL familyMisc.
    NASL idCITRIX_XENSERVER_CTX201078.NASL
    descriptionThe remote host is running a version of Citrix XenServer that is affected by a flaw in the Floppy Disk Controller (FDC) in the bundled QEMU software due to an overflow condition in hw/block/fdc.c when handling certain commands. An attacker, with access to an account on the guest operating system with privilege to access the FDC, can exploit this flaw to execute arbitrary code in the context of the hypervisor process on the host system.
    last seen2020-06-01
    modified2020-06-02
    plugin id83763
    published2015-05-21
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83763
    titleCitrix XenServer QEMU FDC Buffer Overflow RCE (CTX201078) (VENOM)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1003.NASL
    descriptionUpdated kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83430
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83430
    titleRHEL 5 : kvm (RHSA-2015:1003) (Venom)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-248.NASL
    descriptionA vulnerability was discovered in the qemu virtualisation solution : CVE-2015-3456 Jason Geffner discovered a buffer overflow in the emulated floppy disk drive, resulting in the potential execution of arbitrary code. Despite the end-of-life of qemu support in the old-oldstable distribution (squeeze-lts), this problem has been fixed in version 0.12.5+dfsg-3squeeze4 of the qemu source package due to its severity (the so-called VENOM vulnerability). Further problems may still be present in the qemu package in the old-oldstable distribution (squeeze-lts) and users who need to rely on qemu are encouraged to upgrade to a newer version of Debian. We recommend that you upgrade your qemu packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-06-22
    plugin id84294
    published2015-06-22
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84294
    titleDebian DLA-248-1 : qemu security update (Venom)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1002.NASL
    descriptionFrom Red Hat Security Advisory 2015:1002 : Updated xen packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83446
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83446
    titleOracle Linux 5 : xen (ELSA-2015-1002) (Venom)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-8252.NASL
    descriptionPrivilege escalation via emulated floppy disk drive [XSA-133, CVE-2015-3456] (#1221153) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-27
    plugin id83832
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83832
    titleFedora 20 : xen-4.3.4-4.fc20 (2015-8252) (Venom)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0999.NASL
    descriptionUpdated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-06-01
    modified2020-06-02
    plugin id83426
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83426
    titleRHEL 7 : qemu-kvm (RHSA-2015:0999) (Venom)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3259.NASL
    descriptionSeveral vulnerabilities were discovered in the qemu virtualisation solution : - CVE-2014-9718 It was discovered that the IDE controller emulation is susceptible to denial of service. - CVE-2015-1779 Daniel P. Berrange discovered a denial of service vulnerability in the VNC web socket decoder. - CVE-2015-2756 Jan Beulich discovered that unmediated PCI command register could result in denial of service. - CVE-2015-3456 Jason Geffner discovered a buffer overflow in the emulated floppy disk drive, resulting in the potential execution of arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id83422
    published2015-05-13
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83422
    titleDebian DSA-3259-1 : qemu - security update (Venom)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0058.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - force the fifo access to be in bounds of the allocated buffer This is CVE-2015-3456. [bug 21078935] (CVE-2015-3456) - xen: limit guest control of PCI command register Otherwise the guest can abuse that control to cause e.g. PCIe Unsupported Request responses (by disabling memory and/or I/O decoding and subsequently causing [CPU side] accesses to the respective address ranges), which (depending on system configuration) may be fatal to the host. This is CVE-2015-2756 / XSA-126. Conflicts: tools/ioemu-remote/hw/pass-through.c (CVE-2015-2756) - Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64 GFNs (or less) Said hypercall for large BARs can take quite a while. As such we can require that the hypercall MUST break up the request in smaller values. Another approach is to add preemption to it - whether we do the preemption using hypercall_create_continuation or returning EAGAIN to userspace (and have it re-invocate the call) - either way the issue we cannot easily solve is that in
    last seen2020-06-01
    modified2020-06-02
    plugin id83483
    published2015-05-15
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83483
    titleOracleVM 3.2 : xen (OVMSA-2015-0058) (Venom)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0940-1.NASL
    descriptionXen was updated to fix two security issues : CVE-2015-3456: A buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. CVE-2015-3340: An information leak through XEN_DOMCTL_gettscinfo(). (XSA-132) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id83856
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83856
    titleSUSE SLES11 Security Update : Xen (SUSE-SU-2015:0940-1) (Venom)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-268.NASL
    descriptionThree vulnerabilities have been fixed in the Debian squeeze-lts version of VirtualBox (package name: virtualbox-ose), a x86 virtualisation solution. CVE-2015-0377 Avoid VirtualBox allowing local users to affect availability via unknown vectors related to Core, which might result in denial of service. (Other issue than CVE-2015-0418). CVE-2015-0418 Avoid VirtualBox allowing local users to affect availability via unknown vectors related to Core, which might result in denial of service. (Other issue than CVE-2015-0377). CVE-2015-3456 The Floppy Disk Controller (FDC) in QEMU, also used in VirtualBox and other virtualization products, allowed local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-07-07
    plugin id84551
    published2015-07-07
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84551
    titleDebian DLA-268-1 : virtualbox-ose security update (Venom)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150513_KVM_ON_SL5_X.NASL
    descriptionAn out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-03-18
    modified2015-05-14
    plugin id83457
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83457
    titleScientific Linux Security Update : kvm on SL5.x x86_64 (20150513) (Venom)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150513_QEMU_KVM_ON_SL7_X.NASL
    descriptionAn out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-03-18
    modified2015-05-14
    plugin id83459
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83459
    titleScientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20150513) (Venom)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3262.NASL
    descriptionJason Geffner discovered a buffer overflow in the emulated floppy disk drive, resulting in the potential execution of arbitrary code. This only affects HVM guests.
    last seen2020-06-01
    modified2020-06-02
    plugin id83532
    published2015-05-19
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83532
    titleDebian DSA-3262-1 : xen - security update (Venom)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150513_XEN_ON_SL5_X.NASL
    descriptionAn out-of-bounds memory access flaw was found in the way QEMU
    last seen2020-03-18
    modified2015-05-14
    plugin id83460
    published2015-05-14
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83460
    titleScientific Linux Security Update : xen on SL5.x i386/x86_64 (20150513) (Venom)
  • NASL familyFirewalls
    NASL idCHECK_POINT_GAIA_SK106060.NASL
    descriptionThe remote host is running a version of Gaia OS which is affected by a vulnerability in the virtual floppy drive code which may allow an attacker to escape a virtualized environment and obtain code execution on the underlying host.
    last seen2020-06-01
    modified2020-06-02
    plugin id104999
    published2017-12-04
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/104999
    titleCheck Point Gaia Operating System VM escape and code execution (sk106060)(VENOM)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-0944-1.NASL
    descriptionXen was updated to fix two security issues and a bug : CVE-2015-3456: A buffer overflow in the floppy drive emulation, which could be used to carry out denial of service attacks or potential code execution against the host. This vulnerability is also known as VENOM. CVE-2015-3340: Xen did not initialize certain fields, which allowed certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. An exception in setCPUAffinity when restoring guests. (bsc#910441) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id83859
    published2015-05-27
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/83859
    titleSUSE SLES11 Security Update : Xen (SUSE-SU-2015:0944-1) (Venom)

Redhat

advisories
  • bugzilla
    id1218611
    titleCVE-2015-3456 qemu: fdc: out-of-bounds fifo buffer memory access
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentqemu-guest-agent is earlier than 2:0.12.1.2-2.448.el6_6.3
            ovaloval:com.redhat.rhsa:tst:20150998001
          • commentqemu-guest-agent is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20121234002
        • AND
          • commentqemu-kvm is earlier than 2:0.12.1.2-2.448.el6_6.3
            ovaloval:com.redhat.rhsa:tst:20150998003
          • commentqemu-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345004
        • AND
          • commentqemu-kvm-tools is earlier than 2:0.12.1.2-2.448.el6_6.3
            ovaloval:com.redhat.rhsa:tst:20150998005
          • commentqemu-kvm-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345002
        • AND
          • commentqemu-img is earlier than 2:0.12.1.2-2.448.el6_6.3
            ovaloval:com.redhat.rhsa:tst:20150998007
          • commentqemu-img is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345006
    rhsa
    idRHSA-2015:0998
    released2015-05-13
    severityImportant
    titleRHSA-2015:0998: qemu-kvm security update (Important)
  • bugzilla
    id1218611
    titleCVE-2015-3456 qemu: fdc: out-of-bounds fifo buffer memory access
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentlibcacard-devel is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999001
          • commentlibcacard-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704012
        • AND
          • commentqemu-kvm is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999003
          • commentqemu-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345004
        • AND
          • commentqemu-kvm-tools is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999005
          • commentqemu-kvm-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345002
        • AND
          • commentqemu-img is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999007
          • commentqemu-img is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110345006
        • AND
          • commentlibcacard-tools is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999009
          • commentlibcacard-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704006
        • AND
          • commentqemu-kvm-common is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999011
          • commentqemu-kvm-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704004
        • AND
          • commentlibcacard is earlier than 10:1.5.3-86.el7_1.2
            ovaloval:com.redhat.rhsa:tst:20150999013
          • commentlibcacard is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140704008
    rhsa
    idRHSA-2015:0999
    released2015-05-13
    severityImportant
    titleRHSA-2015:0999: qemu-kvm security update (Important)
  • bugzilla
    id1218611
    titleCVE-2015-3456 qemu: fdc: out-of-bounds fifo buffer memory access
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentxen-libs is earlier than 0:3.0.3-146.el5_11
            ovaloval:com.redhat.rhsa:tst:20151002001
          • commentxen-libs is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070114002
        • AND
          • commentxen-devel is earlier than 0:3.0.3-146.el5_11
            ovaloval:com.redhat.rhsa:tst:20151002003
          • commentxen-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070114006
        • AND
          • commentxen is earlier than 0:3.0.3-146.el5_11
            ovaloval:com.redhat.rhsa:tst:20151002005
          • commentxen is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070114004
    rhsa
    idRHSA-2015:1002
    released2015-05-13
    severityImportant
    titleRHSA-2015:1002: xen security update (Important)
  • bugzilla
    id1218611
    titleCVE-2015-3456 qemu: fdc: out-of-bounds fifo buffer memory access
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentkvm-qemu-img is earlier than 0:83-272.el5_11
            ovaloval:com.redhat.rhsa:tst:20151003001
          • commentkvm-qemu-img is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091465008
        • AND
          • commentkmod-kvm-debug is earlier than 0:83-272.el5_11
            ovaloval:com.redhat.rhsa:tst:20151003003
          • commentkmod-kvm-debug is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20110028004
        • AND
          • commentkmod-kvm is earlier than 0:83-272.el5_11
            ovaloval:com.redhat.rhsa:tst:20151003005
          • commentkmod-kvm is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091465004
        • AND
          • commentkvm-tools is earlier than 0:83-272.el5_11
            ovaloval:com.redhat.rhsa:tst:20151003007
          • commentkvm-tools is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091465002
        • AND
          • commentkvm is earlier than 0:83-272.el5_11
            ovaloval:com.redhat.rhsa:tst:20151003009
          • commentkvm is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091465006
    rhsa
    idRHSA-2015:1003
    released2015-05-13
    severityImportant
    titleRHSA-2015:1003: kvm security update (Important)
  • rhsa
    idRHSA-2015:1000
  • rhsa
    idRHSA-2015:1001
  • rhsa
    idRHSA-2015:1004
  • rhsa
    idRHSA-2015:1011
rpms
  • qemu-guest-agent-2:0.12.1.2-2.448.el6_6.3
  • qemu-img-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.3
  • libcacard-10:1.5.3-86.el7_1.2
  • libcacard-devel-10:1.5.3-86.el7_1.2
  • libcacard-tools-10:1.5.3-86.el7_1.2
  • qemu-img-10:1.5.3-86.el7_1.2
  • qemu-kvm-10:1.5.3-86.el7_1.2
  • qemu-kvm-common-10:1.5.3-86.el7_1.2
  • qemu-kvm-debuginfo-10:1.5.3-86.el7_1.2
  • qemu-kvm-tools-10:1.5.3-86.el7_1.2
  • libcacard-devel-rhev-10:2.1.2-23.el7_1.3
  • libcacard-rhev-10:2.1.2-23.el7_1.3
  • libcacard-tools-rhev-10:2.1.2-23.el7_1.3
  • qemu-img-rhev-10:2.1.2-23.el7_1.3
  • qemu-kvm-common-rhev-10:2.1.2-23.el7_1.3
  • qemu-kvm-rhev-10:2.1.2-23.el7_1.3
  • qemu-kvm-rhev-debuginfo-10:2.1.2-23.el7_1.3
  • qemu-kvm-tools-rhev-10:2.1.2-23.el7_1.3
  • qemu-img-rhev-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.3
  • xen-0:3.0.3-146.el5_11
  • xen-debuginfo-0:3.0.3-146.el5_11
  • xen-devel-0:3.0.3-146.el5_11
  • xen-libs-0:3.0.3-146.el5_11
  • kmod-kvm-0:83-272.el5_11
  • kmod-kvm-debug-0:83-272.el5_11
  • kvm-0:83-272.el5_11
  • kvm-debuginfo-0:83-272.el5_11
  • kvm-qemu-img-0:83-272.el5_11
  • kvm-tools-0:83-272.el5_11
  • libcacard-devel-rhev-10:2.1.2-23.el7_1.3
  • libcacard-rhev-10:2.1.2-23.el7_1.3
  • libcacard-tools-rhev-10:2.1.2-23.el7_1.3
  • qemu-img-rhev-10:2.1.2-23.el7_1.3
  • qemu-img-rhev-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-common-rhev-10:2.1.2-23.el7_1.3
  • qemu-kvm-rhev-10:2.1.2-23.el7_1.3
  • qemu-kvm-rhev-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-rhev-debuginfo-10:2.1.2-23.el7_1.3
  • qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-rhev-tools-2:0.12.1.2-2.448.el6_6.3
  • qemu-kvm-tools-rhev-10:2.1.2-23.el7_1.3
  • rhev-hypervisor6-0:6.6-20150512.0.el6ev
  • rhev-hypervisor7-0:7.1-20150512.1.el7ev
  • qemu-guest-agent-2:0.12.1.2-2.415.el6_5.15
  • qemu-img-2:0.12.1.2-2.415.el6_5.15
  • qemu-kvm-2:0.12.1.2-2.415.el6_5.15
  • qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.15
  • qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.15

The Hacker News

idTHN:7BD85D2AA21CA4E7244B437A1836EBFC
last seen2018-01-27
modified2015-05-14
published2015-05-14
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2015/05/venom-vulnerability.html
titleVenom Vulnerability Exposes Most Data Centers to Cyber Attacks

References