← Zuruck zu CVEs
CVE-2009-3616
CRITICAL9.9
Beschreibung
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
CVE Details
CVSS v3.1 Bewertung9.9
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht10/23/2009
Zuletzt geandert4/9/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
qemu:qemuredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Schwachen (CWE)
CWE-416
Referenzen
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5(secalert@redhat.com)
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331(secalert@redhat.com)
http://marc.info/?l=qemu-devel&m=124324043812915(secalert@redhat.com)
http://rhn.redhat.com/errata/RHEA-2009-1272.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2009/10/16/5(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2009/10/16/8(secalert@redhat.com)
http://www.securityfocus.com/bid/36716(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=501131(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=505641(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=508567(secalert@redhat.com)
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5(af854a3a-2127-422b-91ae-364da2661108)
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=qemu-devel&m=124324043812915(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHEA-2009-1272.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2009/10/16/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2009/10/16/8(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36716(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=501131(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=505641(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=508567(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.