SB2015092806 - Denial of service in QEMU
Published: September 28, 2015 Updated: August 5, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2015-5239)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in the VNC display driver in QEMU. A remote attacker can pass specially crafted CLIENT_CUT_TEXT message to the application, trigger integer overflow and perform a denial of service attack via infinite loop.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/02/7
- http://www.ubuntu.com/usn/USN-2745-1
- https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d