Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.842458
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-2745-1)
Summary:The remote host is missing an update for the 'qemu, qemu-kvm' package(s) announced via the USN-2745-1 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu, qemu-kvm' package(s) announced via the USN-2745-1 advisory.

Vulnerability Insight:
Lian Yihan discovered that QEMU incorrectly handled certain payload
messages in the VNC display driver. A malicious guest could use this issue
to cause the QEMU process to hang, resulting in a denial of service. This
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-5239)

Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause the QEMU process to hang, resulting in a denial of service.
(CVE-2015-5278)

Qinghao Tang discovered that QEMU incorrectly handled receiving certain
packets in the NE2000 network driver. A malicious guest could use this
issue to cause a denial of service, or possibly execute arbitrary code on
the host as the user running the QEMU process. In the default installation,
when QEMU is used with libvirt, attackers would be isolated by the libvirt
AppArmor profile. (CVE-2015-5279)

Qinghao Tang discovered that QEMU incorrectly handled transmit descriptor
data when sending network packets. A malicious guest could use this issue
to cause the QEMU process to hang, resulting in a denial of service.
(CVE-2015-6815)

Qinghao Tang discovered that QEMU incorrectly handled ATAPI command
permissions. A malicious guest could use this issue to cause the QEMU
process to crash, resulting in a denial of service. (CVE-2015-6855)

Affected Software/OS:
'qemu, qemu-kvm' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 15.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-5239
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
http://www.openwall.com/lists/oss-security/2015/09/02/7
http://www.ubuntu.com/usn/USN-2745-1
https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d
https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Common Vulnerability Exposure (CVE) ID: CVE-2015-5278
http://www.openwall.com/lists/oss-security/2015/09/15/2
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-5279
1033569
http://www.securitytracker.com/id/1033569
76746
http://www.securityfocus.com/bid/76746
DSA-3361
http://www.debian.org/security/2015/dsa-3361
DSA-3362
http://www.debian.org/security/2015/dsa-3362
FEDORA-2015-16368
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
FEDORA-2015-16369
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
FEDORA-2015-16370
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
GLSA-201602-01
https://security.gentoo.org/glsa/201602-01
RHSA-2015:1896
http://rhn.redhat.com/errata/RHSA-2015-1896.html
RHSA-2015:1923
http://rhn.redhat.com/errata/RHSA-2015-1923.html
RHSA-2015:1924
http://rhn.redhat.com/errata/RHSA-2015-1924.html
RHSA-2015:1925
http://rhn.redhat.com/errata/RHSA-2015-1925.html
SUSE-SU-2015:1782
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
[Qemu-devel] 20150915 [PULL 2/3] net: add checks to validate ring buffer pointers
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
[oss-security] 20150915 CVE-2015-5279 Qemu: net: add checks to validate ring buffer pointers
http://www.openwall.com/lists/oss-security/2015/09/15/3
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-6815
http://www.openwall.com/lists/oss-security/2015/09/04/4
http://www.openwall.com/lists/oss-security/2015/09/05/5
https://bugzilla.redhat.com/show_bug.cgi?id=1260076
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-6855
76691
http://www.securityfocus.com/bid/76691
FEDORA-2015-4896530727
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html
FEDORA-2015-8dc71ade88
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html
FEDORA-2015-d6ea74993a
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html
USN-2745-1
[Qemu-devel] 20150907 [PATCH] ide: fix ATAPI command permissions
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html
[oss-security] 20150910 CVE request Qemu: ide: divide by zero issue
http://www.openwall.com/lists/oss-security/2015/09/10/1
[oss-security] 20150910 Re: CVE request Qemu: ide: divide by zero issue
http://www.openwall.com/lists/oss-security/2015/09/10/2
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.