{"id":"CVE-2015-3209","details":"Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.","modified":"2026-02-05T13:00:04.910243Z","published":"2015-06-15T15:59:00Z","related":["MGASA-2015-0310","MGASA-2016-0098","SUSE-SU-2015:0870-1","SUSE-SU-2015:0889-1","SUSE-SU-2015:0929-1","SUSE-SU-2015:1042-1","SUSE-SU-2015:1045-1","SUSE-SU-2015:1152-1","SUSE-SU-2015:1156-1","SUSE-SU-2015:1157-1","SUSE-SU-2015:1426-1","SUSE-SU-2015:1519-1"],"references":[{"type":"ADVISORY","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1087.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1088.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1089.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1189.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3284"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3285"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3286"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/75123"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032545"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2630-1"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-135.html"},{"type":"ADVISORY","url":"https://kb.juniper.net/JSA10783"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201510-02"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201604-03"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html"}],"schema_version":"1.7.3"}