Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
References
Link | Resource |
---|---|
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 | Broken Link Exploit |
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 | Broken Link Exploit |
http://marc.info/?l=qemu-devel&m=124324043812915 | Mailing List |
http://rhn.redhat.com/errata/RHEA-2009-1272.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2009/10/16/5 | Mailing List Patch |
http://www.openwall.com/lists/oss-security/2009/10/16/8 | Mailing List Patch |
http://www.securityfocus.com/bid/36716 | Broken Link Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=501131 | Issue Tracking Patch |
https://bugzilla.redhat.com/show_bug.cgi?id=505641 | Exploit Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=508567 | Issue Tracking |
Configurations
History
No history.
Information
Published : 2009-10-23 18:30
Updated : 2024-02-15 21:06
NVD link : CVE-2009-3616
Mitre link : CVE-2009-3616
CVE.ORG link : CVE-2009-3616
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_server
qemu
- qemu
CWE
CWE-416
Use After Free