Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
References
Link | Resource |
---|---|
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 | Broken Link Exploit |
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 | Broken Link Exploit |
http://marc.info/?l=qemu-devel&m=124324043812915 | Mailing List |
http://rhn.redhat.com/errata/RHEA-2009-1272.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2009/10/16/5 | Mailing List Patch |
http://www.openwall.com/lists/oss-security/2009/10/16/8 | Mailing List Patch |
http://www.securityfocus.com/bid/36716 | Broken Link Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=501131 | Issue Tracking Patch |
https://bugzilla.redhat.com/show_bug.cgi?id=505641 | Exploit Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=508567 | Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2009-10-23T18:00:00
Updated: 2009-12-01T10:00:00
Reserved: 2009-10-09T00:00:00
Link: CVE-2009-3616
JSON object: View
NVD Information
Status : Analyzed
Published: 2009-10-23T18:30:00.390
Modified: 2024-02-15T21:06:20.270
Link: CVE-2009-3616
JSON object: View
Redhat Information
No data.
CWE