Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2015-3209 First vendor Publication 2015-06-15
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28657
 
Oval ID: oval:org.mitre.oval:def:28657
Title: SUSE-SU-2015:1152-1 -- Security update for KVM (important)
Description: KVM was updated to fix two security issues:
Family: unix Class: patch
Reference(s): SUSE-SU-2015:1152-1
CVE-2015-3209
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): KVM
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28823
 
Oval ID: oval:org.mitre.oval:def:28823
Title: ELSA-2015-1189 -- kvm security update (important)
Description: [kvm-83-273.0.1.el5] - Added kvm-add-oracle-workaround-for-libvirt-bug.patch - Added kvm-Introduce-oel-machine-type.patch [kvm-83.273.el5] - kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896] - kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896] - kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896] - Resolves: bz#1225896 (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z)
Family: unix Class: patch
Reference(s): ELSA-2015-1189
CVE-2015-3209
Version: 3
Platform(s): Oracle Linux 5
Product(s): kvm
kmod-kvm
kmod-kvm-debug
kvm-qemu-img
kvm-tools
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 37
Application 140
Application 1
Os 4
Os 4
Os 2
Os 3
Os 10
Os 1
Os 1
Os 2
Os 1
Os 1
Os 2
Os 2
Os 5
Os 2

Nessus® Vulnerability Scanner

Date Description
2016-06-23 Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10698.nasl - Type : ACT_GATHER_INFO
2016-04-07 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201604-03.nasl - Type : ACT_GATHER_INFO
2016-02-17 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL63519101.nasl - Type : ACT_GATHER_INFO
2015-11-02 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201510-02.nasl - Type : ACT_GATHER_INFO
2015-09-30 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1643-1.nasl - Type : ACT_GATHER_INFO
2015-09-11 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1519-1.nasl - Type : ACT_GATHER_INFO
2015-09-02 Name : The remote Fedora host is missing a security update.
File : fedora_2015-13404.nasl - Type : ACT_GATHER_INFO
2015-08-25 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1426-1.nasl - Type : ACT_GATHER_INFO
2015-08-24 Name : The remote Fedora host is missing a security update.
File : fedora_2015-13358.nasl - Type : ACT_GATHER_INFO
2015-08-18 Name : The remote Fedora host is missing a security update.
File : fedora_2015-13402.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1206-1.nasl - Type : ACT_GATHER_INFO
2015-07-06 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150625_kvm_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2015-06-30 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1157-1.nasl - Type : ACT_GATHER_INFO
2015-06-30 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1156-1.nasl - Type : ACT_GATHER_INFO
2015-06-29 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1152-1.nasl - Type : ACT_GATHER_INFO
2015-06-29 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_acd5d0371c3311e5be9c6805ca1d3bb1.nasl - Type : ACT_GATHER_INFO
2015-06-26 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-1189.nasl - Type : ACT_GATHER_INFO
2015-06-26 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1189.nasl - Type : ACT_GATHER_INFO
2015-06-26 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-1189.nasl - Type : ACT_GATHER_INFO
2015-06-25 Name : The remote Fedora host is missing a security update.
File : fedora_2015-9978.nasl - Type : ACT_GATHER_INFO
2015-06-25 Name : The remote Fedora host is missing a security update.
File : fedora_2015-9965.nasl - Type : ACT_GATHER_INFO
2015-06-25 Name : The remote Fedora host is missing a security update.
File : fedora_2015-10001.nasl - Type : ACT_GATHER_INFO
2015-06-23 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-435.nasl - Type : ACT_GATHER_INFO
2015-06-23 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-434.nasl - Type : ACT_GATHER_INFO
2015-06-15 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3285.nasl - Type : ACT_GATHER_INFO
2015-06-15 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3284.nasl - Type : ACT_GATHER_INFO
2015-06-15 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3286.nasl - Type : ACT_GATHER_INFO
2015-06-15 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1088.nasl - Type : ACT_GATHER_INFO
2015-06-15 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1045-1.nasl - Type : ACT_GATHER_INFO
2015-06-12 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1042-1.nasl - Type : ACT_GATHER_INFO
2015-06-12 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2015-0068.nasl - Type : ACT_GATHER_INFO
2015-06-12 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2015-0067.nasl - Type : ACT_GATHER_INFO
2015-06-11 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-1087.nasl - Type : ACT_GATHER_INFO
2015-06-11 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2630-1.nasl - Type : ACT_GATHER_INFO
2015-06-11 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150610_qemu_kvm_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2015-06-11 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1087.nasl - Type : ACT_GATHER_INFO
2015-06-11 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-1087.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/75123
CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
http://xenbits.xen.org/xsa/advisory-135.html
https://kb.juniper.net/JSA10783
DEBIAN http://www.debian.org/security/2015/dsa-3284
http://www.debian.org/security/2015/dsa-3285
http://www.debian.org/security/2015/dsa-3286
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
GENTOO https://security.gentoo.org/glsa/201510-02
https://security.gentoo.org/glsa/201604-03
MISC https://www.arista.com/en/support/advisories-notices/security-advisories/1180...
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1087.html
http://rhn.redhat.com/errata/RHSA-2015-1088.html
http://rhn.redhat.com/errata/RHSA-2015-1089.html
http://rhn.redhat.com/errata/RHSA-2015-1189.html
SECTRACK http://www.securitytracker.com/id/1032545
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
UBUNTU http://www.ubuntu.com/usn/USN-2630-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
Date Informations
2024-02-02 01:31:56
  • Multiple Updates
2024-02-01 12:09:20
  • Multiple Updates
2023-09-05 12:30:21
  • Multiple Updates
2023-09-05 01:09:11
  • Multiple Updates
2023-09-02 12:30:18
  • Multiple Updates
2023-09-02 01:09:21
  • Multiple Updates
2023-08-12 12:33:04
  • Multiple Updates
2023-08-12 01:08:49
  • Multiple Updates
2023-08-11 12:28:22
  • Multiple Updates
2023-08-11 01:09:04
  • Multiple Updates
2023-08-06 12:27:34
  • Multiple Updates
2023-08-06 01:08:49
  • Multiple Updates
2023-08-04 12:27:39
  • Multiple Updates
2023-08-04 01:08:52
  • Multiple Updates
2023-07-14 12:27:39
  • Multiple Updates
2023-07-14 01:08:50
  • Multiple Updates
2023-03-29 01:29:23
  • Multiple Updates
2023-03-28 12:09:10
  • Multiple Updates
2023-02-13 05:28:09
  • Multiple Updates
2023-02-02 21:28:30
  • Multiple Updates
2022-10-11 12:24:54
  • Multiple Updates
2022-10-11 01:08:58
  • Multiple Updates
2022-05-10 01:20:14
  • Multiple Updates
2022-02-11 12:19:27
  • Multiple Updates
2022-01-26 17:23:19
  • Multiple Updates
2021-05-05 01:17:46
  • Multiple Updates
2021-05-04 12:39:33
  • Multiple Updates
2021-04-22 01:48:24
  • Multiple Updates
2021-01-27 01:13:19
  • Multiple Updates
2020-11-03 12:12:55
  • Multiple Updates
2020-09-09 21:23:00
  • Multiple Updates
2020-05-23 01:55:34
  • Multiple Updates
2020-05-23 00:45:07
  • Multiple Updates
2019-01-29 12:03:33
  • Multiple Updates
2018-08-12 12:00:54
  • Multiple Updates
2018-06-22 12:05:54
  • Multiple Updates
2018-05-23 12:06:09
  • Multiple Updates
2018-02-06 01:03:32
  • Multiple Updates
2018-01-31 01:06:03
  • Multiple Updates
2018-01-05 09:23:28
  • Multiple Updates
2017-11-04 09:23:38
  • Multiple Updates
2017-10-28 12:01:38
  • Multiple Updates
2017-07-01 09:23:14
  • Multiple Updates
2017-05-24 09:23:30
  • Multiple Updates
2016-12-31 09:24:29
  • Multiple Updates
2016-12-28 09:22:07
  • Multiple Updates
2016-12-24 09:24:12
  • Multiple Updates
2016-12-22 09:23:57
  • Multiple Updates
2016-12-08 09:23:43
  • Multiple Updates
2016-12-03 09:24:12
  • Multiple Updates
2016-11-29 00:25:11
  • Multiple Updates
2016-06-29 01:16:44
  • Multiple Updates
2016-06-29 00:56:26
  • Multiple Updates
2016-06-24 13:26:47
  • Multiple Updates
2016-04-19 05:25:55
  • Multiple Updates
2016-04-18 21:26:03
  • Multiple Updates
2016-04-12 09:25:23
  • Multiple Updates
2016-04-08 13:24:01
  • Multiple Updates
2016-02-18 13:27:47
  • Multiple Updates
2015-11-23 21:25:42
  • Multiple Updates
2015-11-03 13:24:28
  • Multiple Updates
2015-10-20 16:20:24
  • Multiple Updates
2015-10-20 09:23:31
  • Multiple Updates
2015-10-01 13:23:53
  • Multiple Updates
2015-09-12 13:25:46
  • Multiple Updates
2015-09-03 13:29:21
  • Multiple Updates
2015-08-27 13:38:46
  • Multiple Updates
2015-08-25 13:29:55
  • Multiple Updates
2015-08-19 13:30:19
  • Multiple Updates
2015-07-18 13:29:15
  • Multiple Updates
2015-07-08 13:28:39
  • Multiple Updates
2015-07-01 13:27:49
  • Multiple Updates
2015-06-30 13:26:53
  • Multiple Updates
2015-06-27 13:28:55
  • Multiple Updates
2015-06-26 13:27:33
  • Multiple Updates
2015-06-24 13:27:48
  • Multiple Updates
2015-06-24 05:26:11
  • Multiple Updates
2015-06-24 00:25:35
  • Multiple Updates
2015-06-23 21:26:59
  • Multiple Updates
2015-06-17 21:26:58
  • Multiple Updates
2015-06-16 13:28:17
  • Multiple Updates
2015-06-15 21:27:42
  • First insertion