Vulnerabilities > CVE-2015-5154 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1421-1.NASL description Xen was updated to fix the following security issues : - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344) - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (XSA-140, bsc#939712) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85598 published 2015-08-24 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85598 title SUSE SLES11 Security Update : xen (SUSE-SU-2015:1421-1) NASL family Fedora Local Security Checks NASL id FEDORA_2015-13404.NASL description - Fix crash in qemu_spice_create_display (bz #1163047) * CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536) * CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728) * CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141) * CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160) * CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2015-09-02 plugin id 85727 published 2015-09-02 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85727 title Fedora 21 : qemu-2.1.3-9.fc21 (2015-13404) NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-750.NASL description xen was updated to fix 12 security issues. These security issues were fixed : - CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845). - CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706). - CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267). - CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165). - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712). - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634). These non-security issues were fixed : - bsc#907514: Bus fatal error and sles12 sudden reboot has been observed - bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been observed - bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has been observed - bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores - bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show errors - bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort - bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() - bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue - bsc#925466: Kdump does not work in a XEN environment last seen 2020-06-05 modified 2015-11-18 plugin id 86909 published 2015-11-18 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86909 title openSUSE Security Update : xen (openSUSE-2015-750) NASL family OracleVM Local Security Checks NASL id ORACLEVM_OVMSA-2015-0095.NASL description The remote OracleVM system is missing necessary patches to address critical security updates : - ide: Clear DRQ after handling all expected accesses This is additional hardening against an end_transfer_func that fails to clear the DRQ status bit. The bit must be unset as soon as the PIO transfer has completed, so it last seen 2020-06-01 modified 2020-06-02 plugin id 85037 published 2015-07-28 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85037 title OracleVM 3.3 : xen (OVMSA-2015-0095) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2015-1508.NASL description Updated qemu-kvm-rhev packages that fix two security issues are now available for Red Hat Enterprise Virtualization Hypervisor 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap buffer overflow flaw was found in the way QEMU last seen 2020-06-01 modified 2020-06-02 plugin id 117306 published 2018-09-06 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117306 title RHEL 7 : qemu-kvm-rhev (RHSA-2015:1508) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1479-2.NASL description xen was updated to fix the following security issues : - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140) - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139) - CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127) - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137) - CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136) - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85792 published 2015-09-04 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85792 title SUSE SLED11 Security Update : xen (SUSE-SU-2015:1479-2) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1426-1.NASL description kvm was updated to fix two security issues. The following vulnerabilities were fixed : - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). - CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85625 published 2015-08-25 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85625 title SUSE SLES11 Security Update : kvm (SUSE-SU-2015:1426-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1472-1.NASL description kvm was updated to fix one security issue. This security issue was fixed : - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85761 published 2015-09-03 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85761 title SUSE SLED11 / SLES11 Security Update : kvm (SUSE-SU-2015:1472-1) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_DA451130365D11E5A4A5002590263BF5.NASL description The Xen Project reports : A heap overflow flaw was found in the way QEMU last seen 2020-06-01 modified 2020-06-02 plugin id 85234 published 2015-08-05 reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85234 title FreeBSD : qemu, xen-tools -- QEMU heap overflow flaw with certain ATAPI commands (da451130-365d-11e5-a4a5-002590263bf5) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-3348.NASL description Several vulnerabilities were discovered in qemu, a fast processor emulator. - CVE-2015-3214 Matt Tait of Google last seen 2020-06-01 modified 2020-06-02 plugin id 85754 published 2015-09-03 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85754 title Debian DSA-3348-1 : qemu - security update NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-2324-1.NASL description This update fixes the following security issues : - bsc#956832 - CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list - Revert x86/IO-APIC: don last seen 2020-06-01 modified 2020-06-02 plugin id 87588 published 2015-12-22 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/87588 title SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2015:2324-1) NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-892.NASL description This update fixes the following security issues : - bsc#947165 - CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) - bsc#954405 - CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) - bsc#950704 - CVE-2015-7970 xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch last seen 2020-06-05 modified 2015-12-16 plugin id 87393 published 2015-12-16 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/87393 title openSUSE Security Update : xen (openSUSE-2015-892) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1408-1.NASL description This security update of Xen fixes the following issues : - bsc#939712 (XSA-140): QEMU leak of uninitialized heap memory in rtl8139 device model (CVE-2015-5165) - bsc#938344: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM (CVE-2015-5154) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85575 published 2015-08-21 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85575 title SUSE SLES11 Security Update : xen (SUSE-SU-2015:1408-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1455-1.NASL description kvm was updated to fix one security issue. This security issue was fixed : - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85722 published 2015-09-01 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85722 title SUSE SLED11 / SLES11 Security Update : kvm (SUSE-SU-2015:1455-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1302-1.NASL description xen was updated to fix two security issues. These security issues were fixed : - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85074 published 2015-07-29 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85074 title SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2015:1302-1) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2015-1507.NASL description Updated qemu-kvm packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap buffer overflow flaw was found in the way QEMU last seen 2020-06-01 modified 2020-06-02 plugin id 85030 published 2015-07-28 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85030 title CentOS 7 : qemu-kvm (CESA-2015:1507) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1643-1.NASL description Xen was updated to fix the following security issues : CVE-2015-5154: Host code execution via IDE subsystem CD-ROM. (bsc#938344) CVE-2015-3209: Heap overflow in QEMU last seen 2020-06-01 modified 2020-06-02 plugin id 86203 published 2015-09-30 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86203 title SUSE SLES10 Security Update : Xen (SUSE-SU-2015:1643-1) NASL family Scientific Linux Local Security Checks NASL id SL_20150727_QEMU_KVM_ON_SL7_X.NASL description A heap buffer overflow flaw was found in the way QEMU last seen 2020-03-18 modified 2015-07-29 plugin id 85072 published 2015-07-29 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85072 title Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20150727) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201604-03.NASL description The remote host is affected by the vulnerability described in GLSA-201604-03 (Xen: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. Impact : A local attacker could possibly cause a Denial of Service condition or obtain sensitive information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 90380 published 2016-04-07 reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/90380 title GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2015-1507.NASL description From Red Hat Security Advisory 2015:1507 : Updated qemu-kvm packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap buffer overflow flaw was found in the way QEMU last seen 2020-06-01 modified 2020-06-02 plugin id 85035 published 2015-07-28 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85035 title Oracle Linux 7 : qemu-kvm (ELSA-2015-1507) NASL family OracleVM Local Security Checks NASL id ORACLEVM_OVMSA-2015-0096.NASL description The remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2015-0096 for details. last seen 2020-06-01 modified 2020-06-02 plugin id 85038 published 2015-07-28 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85038 title OracleVM 3.2 : xen (OVMSA-2015-0096) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201510-02.NASL description The remote host is affected by the vulnerability described in GLSA-201510-02 (QEMU: Arbitrary code execution) Heap-based buffer overflow has been found in QEMU’s PCNET controller. Impact : A remote attacker could execute arbitrary code via a specially crafted packets. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 86687 published 2015-11-02 reporter This script is Copyright (C) 2015-2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/86687 title GLSA-201510-02 : QEMU: Arbitrary code execution NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-2692-1.NASL description Matt Tait discovered that QEMU incorrectly handled PIT emulation. In a non-default configuration, a malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. (CVE-2015-3214) Kevin Wolf discovered that QEMU incorrectly handled processing ATAPI commands. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. (CVE-2015-5154) Zhu Donghai discovered that QEMU incorrectly handled the SCSI driver. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. This issue only affected Ubuntu 15.04. (CVE-2015-5158). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85080 published 2015-07-29 reporter Ubuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85080 title Ubuntu 14.04 LTS / 15.04 : qemu vulnerabilities (USN-2692-1) NASL family Fedora Local Security Checks NASL id FEDORA_2015-12679.NASL description QEMU heap overflow flaw while processing certain ATAPI commands. [XSA-138, CVE-2015-5154] (#1247142) try again to fix xen-qemu-dom0-disk-backend.service (#1242246) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2015-08-11 plugin id 85316 published 2015-08-11 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85316 title Fedora 23 : xen-4.5.1-5.fc23 (2015-12679) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1782-1.NASL description qemu was updated to fix several security issues and bugs. The following vulnerabilities were fixed : - CVE-2015-5154: Heap-based buffer overflow in the IDE subsystem in QEMU, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands. (bsc#938344). - CVE-2015-5278: QEMU was vulnerable to an infinite loop issue that could occur when receiving packets over the network. (bsc#945989) - CVE-2015-5279: QEMU was vulnerable to a heap buffer overflow issue that could occur when receiving packets over the network. (bsc#945987) - CVE-2015-6855: QEMU was vulnerable to a divide by zero issue that could occur while executing an IDE command WIN_READ_NATIVE_MAX to determine the maximum size of a drive. (bsc#945404) - CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value. (bsc#902737) : Also The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 86490 published 2015-10-21 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86490 title SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2015:1782-1) NASL family Fedora Local Security Checks NASL id FEDORA_2015-12714.NASL description QEMU heap overflow flaw while processing certain ATAPI commands. [XSA-138, CVE-2015-5154] (#1247142) rebuild efi grub.cfg if it is present (#1239309), add gcc5 build fixes, one needed for the following patch, modify gnutls use in line with Fedora last seen 2020-06-05 modified 2015-08-13 plugin id 85361 published 2015-08-13 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85361 title Fedora 21 : xen-4.4.2-9.fc21 (2015-12714) NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-729.NASL description xen was updated to fix 13 security issues. These security issues were fixed : - CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845). - CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706). - CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267). - CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165). - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712). - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709). - CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463). - CVE-2015-6815: e1000: infinite loop issue (bsc#944697). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). This non-security issues was fixed : - bsc#941074: VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. last seen 2020-06-05 modified 2015-11-13 plugin id 86863 published 2015-11-13 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86863 title openSUSE Security Update : xen (openSUSE-2015-729) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1479-1.NASL description xen was updated to fix the following security issues : - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140) - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139) - CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127) - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137) - CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136) - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85791 published 2015-09-04 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85791 title SUSE SLED11 / SLES11 Security Update : xen (SUSE-SU-2015:1479-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1299-1.NASL description xen was updated to fix two security issues. These security issues were fixed : - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85073 published 2015-07-29 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85073 title SUSE SLED11 / SLES11 Security Update : xen (SUSE-SU-2015:1299-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2015-1409-1.NASL description kvm was updated to fix one security issue. This security issue was fixed : - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85576 published 2015-08-21 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85576 title SUSE SLES11 Security Update : kvm (SUSE-SU-2015:1409-1) NASL family Fedora Local Security Checks NASL id FEDORA_2015-13402.NASL description - Rebased to version 2.3.1 - Fix crash in qemu_spice_create_display (bz #1163047) - Fix qemu-img map crash for unaligned image (bz #1229394) - CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536) - CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728) - CVE-2015-5158: scsi stack-based buffer overflow (bz #1246025) - CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141) - CVE-2015-5166: BlockBackend object use after free issue (bz #1249758) - CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160) - CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2015-08-18 plugin id 85480 published 2015-08-18 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85480 title Fedora 22 : qemu-2.3.1-1.fc22 (2015-13402) NASL family Fedora Local Security Checks NASL id FEDORA_2015-12657.NASL description QEMU heap overflow flaw while processing certain ATAPI commands. [XSA-138, CVE-2015-5154] (#1247142) try again to fix xen-qemu-dom0-disk-backend.service (#1242246) correct qemu location in xen-qemu-dom0-disk-backend.service (#1242246), rebuild efi grub.cfg if it is present (#1239309), re-enable remus by building with libnl3, modify gnutls use in line with Fedora last seen 2020-06-05 modified 2015-08-13 plugin id 85359 published 2015-08-13 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85359 title Fedora 22 : xen-4.5.1-5.fc22 (2015-12657) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2015-1507.NASL description Updated qemu-kvm packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap buffer overflow flaw was found in the way QEMU last seen 2020-06-01 modified 2020-06-02 plugin id 85040 published 2015-07-28 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85040 title RHEL 7 : qemu-kvm (RHSA-2015:1507) NASL family Fedora Local Security Checks NASL id FEDORA_2015-13358.NASL description - Rebased to version 2.4.0 * Support for virtio-gpu, 2D only * Support for virtio-based keyboard/mouse/tablet emulation * x86 support for memory hot-unplug - ACPI v5.1 table support for last seen 2020-06-05 modified 2015-08-24 plugin id 85592 published 2015-08-24 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85592 title Fedora 23 : qemu-2.4.0-1.fc23 (2015-13358) NASL family Misc. NASL id CITRIX_XENSERVER_CTX201593.NASL description The version of Citrix XenServer running on the remote host is affected by a heap buffer overflow condition in the IDE subsystem of the bundled QEMU software, which is related to I/O buffer access when handling certain ATAPI commands. An attacker, with sufficient privileges in an HVM guest VM, can exploit this issue to execute arbitrary code in the context of the hypervisor process on the host system. Note that exploitation requires the CDROM drive to be enabled on the guest system. last seen 2020-06-01 modified 2020-06-02 plugin id 85242 published 2015-08-05 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85242 title Citrix XenServer QEMU IDE Buffer Overflow Code Execution (CTX201593)
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163472.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163472.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163658.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163658.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163681.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163681.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2015-1507.html
- http://rhn.redhat.com/errata/RHSA-2015-1507.html
- http://rhn.redhat.com/errata/RHSA-2015-1508.html
- http://rhn.redhat.com/errata/RHSA-2015-1508.html
- http://rhn.redhat.com/errata/RHSA-2015-1512.html
- http://rhn.redhat.com/errata/RHSA-2015-1512.html
- http://support.citrix.com/article/CTX201593
- http://support.citrix.com/article/CTX201593
- http://www.debian.org/security/2015/dsa-3348
- http://www.debian.org/security/2015/dsa-3348
- http://www.securityfocus.com/bid/76048
- http://www.securityfocus.com/bid/76048
- http://www.securitytracker.com/id/1033074
- http://www.securitytracker.com/id/1033074
- http://xenbits.xen.org/xsa/advisory-138.html
- http://xenbits.xen.org/xsa/advisory-138.html
- https://security.gentoo.org/glsa/201510-02
- https://security.gentoo.org/glsa/201510-02
- https://security.gentoo.org/glsa/201604-03
- https://security.gentoo.org/glsa/201604-03