cnvd-2015-03045
Vulnerability from cnvd

Title: QEMU 'hw/block/fdc.c' VENOM远程内存破坏漏洞

Description:

QEMU是一个指令级模拟器的自由软件实现,被广泛用于各大GNU/Linux发行版(包括Debian, Gentoo, SUSE, RedHat, CentOS等)。

VENOM是存在于虚拟软盘驱动器(FDC)代码中的安全漏洞。允许攻击者利用漏洞造成拒绝服务(出界外写入和来宾崩溃)或可能通过(1)FD_CMD_READ_ID,(2)FD_CMD_DRIVE_SPECIFICATION_COMMAND执行任意代码。

Severity:

Patch Name: QEMU 'hw/block/fdc.c' VENOM远程内存破坏漏洞的补丁

Patch Description:

QEMU是一个指令级模拟器的自由软件实现,被广泛用于各大GNU/Linux发行版(包括Debian, Gentoo, SUSE, RedHat, CentOS等)。

VENOM是存在于虚拟软盘驱动器(FDC)代码中的安全漏洞。允许攻击者利用漏洞造成拒绝服务(出界外写入和来宾崩溃)或可能通过(1)FD_CMD_READ_ID,(2)FD_CMD_DRIVE_SPECIFICATION_COMMAND执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可参考如下供应商提供的安全公告获得补丁信息: http://www.freebuf.com/news/67325.html

Reference: http://www.securityfocus.com/bid/74640 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3456 http://www.freebuf.com/news/67325.html

Impacted products
Name
['Red Hat Enterprise Linux Desktop 5 client', 'Red Hat Enterprise Linux Desktop 6', 'Citrix XenServer 6.0', 'Red Hat Enterprise Linux 5 server', 'Oracle Enterprise Linux 6', 'Oracle Enterprise Linux 5', 'Oracle Enterprise Linux 6.2', 'Ubuntu Ubuntu Linux 12.04 LTS i386', 'QEMU QEMU 0', 'Red Hat Enterprise Linux Workstation 6', 'Red Hat Enterprise Linux Server 6', 'Red Hat Enterprise Linux HPC Node 6', 'Debian Linux 6.0 sparc', 'Debian Linux 6.0 amd64', 'Debian Linux 6.0 arm', 'Debian Linux 6.0 ia-32', 'Debian Linux 6.0 ia-64', 'Debian Linux 6.0 mips', 'Debian Linux 6.0 powerpc', 'Debian Linux 6.0 s/390', 'CentOS CentOS 6', 'Ubuntu Ubuntu Linux 12.04 LTS amd64', 'CentOS CentOS 5', 'Red Hat Enterprise Linux Desktop Multi OS 5 client', 'Red Hat Enterprise Linux Virtualization 5 server']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "74640"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-3456"
    }
  },
  "description": "QEMU\u662f\u4e00\u4e2a\u6307\u4ee4\u7ea7\u6a21\u62df\u5668\u7684\u81ea\u7531\u8f6f\u4ef6\u5b9e\u73b0\uff0c\u88ab\u5e7f\u6cdb\u7528\u4e8e\u5404\u5927GNU/Linux\u53d1\u884c\u7248\uff08\u5305\u62ecDebian, Gentoo, SUSE, RedHat, CentOS\u7b49\uff09\u3002\r\n\r\nVENOM\u662f\u5b58\u5728\u4e8e\u865a\u62df\u8f6f\u76d8\u9a71\u52a8\u5668\uff08FDC\uff09\u4ee3\u7801\u4e2d\u7684\u5b89\u5168\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u51fa\u754c\u5916\u5199\u5165\u548c\u6765\u5bbe\u5d29\u6e83\uff09\u6216\u53ef\u80fd\u901a\u8fc7\uff081\uff09FD_CMD_READ_ID\uff0c\uff082\uff09FD_CMD_DRIVE_SPECIFICATION_COMMAND\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "Jason Geffner, CrowdStrike Senior Security Researcher",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.freebuf.com/news/67325.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-03045",
  "openTime": "2015-05-15",
  "patchDescription": "QEMU\u662f\u4e00\u4e2a\u6307\u4ee4\u7ea7\u6a21\u62df\u5668\u7684\u81ea\u7531\u8f6f\u4ef6\u5b9e\u73b0\uff0c\u88ab\u5e7f\u6cdb\u7528\u4e8e\u5404\u5927GNU/Linux\u53d1\u884c\u7248\uff08\u5305\u62ecDebian, Gentoo, SUSE, RedHat, CentOS\u7b49\uff09\u3002 \r\n\r\nVENOM\u662f\u5b58\u5728\u4e8e\u865a\u62df\u8f6f\u76d8\u9a71\u52a8\u5668\uff08FDC\uff09\u4ee3\u7801\u4e2d\u7684\u5b89\u5168\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u51fa\u754c\u5916\u5199\u5165\u548c\u6765\u5bbe\u5d29\u6e83\uff09\u6216\u53ef\u80fd\u901a\u8fc7\uff081\uff09FD_CMD_READ_ID\uff0c\uff082\uff09FD_CMD_DRIVE_SPECIFICATION_COMMAND\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "QEMU \u0027hw/block/fdc.c\u0027 VENOM\u8fdc\u7a0b\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Red Hat Enterprise Linux Desktop 5 client",
      "Red Hat Enterprise Linux Desktop 6",
      "Citrix XenServer 6.0",
      "Red Hat Enterprise Linux   5 server",
      "Oracle Enterprise Linux 6",
      "Oracle Enterprise Linux 5",
      "Oracle Enterprise Linux 6.2",
      "Ubuntu Ubuntu Linux 12.04 LTS i386",
      "QEMU QEMU 0",
      "Red Hat Enterprise Linux Workstation 6",
      "Red Hat Enterprise Linux Server 6",
      "Red Hat Enterprise Linux HPC Node 6",
      "Debian Linux 6.0 sparc",
      "Debian Linux 6.0 amd64",
      "Debian Linux 6.0 arm",
      "Debian Linux 6.0 ia-32",
      "Debian Linux 6.0 ia-64",
      "Debian Linux 6.0 mips",
      "Debian Linux 6.0 powerpc",
      "Debian Linux 6.0 s/390",
      "CentOS CentOS 6",
      "Ubuntu Ubuntu Linux  12.04 LTS amd64",
      "CentOS CentOS 5",
      "Red Hat Enterprise Linux Desktop Multi OS 5 client",
      "Red Hat Enterprise Linux Virtualization 5 server"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/74640\r\nhttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3456\r\nhttp://www.freebuf.com/news/67325.html",
  "serverity": "\u9ad8",
  "submitTime": "2015-05-15",
  "title": "QEMU \u0027hw/block/fdc.c\u0027 VENOM\u8fdc\u7a0b\u5185\u5b58\u7834\u574f\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…