{"id":"CVE-2015-7504","details":"Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.","modified":"2026-04-16T06:19:50.665514672Z","published":"2017-10-16T20:29:00Z","related":["SUSE-SU-2015:2306-1","SUSE-SU-2015:2324-1","SUSE-SU-2015:2326-1","SUSE-SU-2015:2328-1","SUSE-SU-2015:2338-1","openSUSE-SU-2024:10196-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2694.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2695.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2696.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3469"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3470"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3471"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/11/30/2"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/78227"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034268"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-162.html"},{"type":"ADVISORY","url":"https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201602-01"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201604-03"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/11/30/2"},{"type":"ARTICLE","url":"https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2015/11/30/2"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-162.html"},{"type":"FIX","url":"https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html"},{"type":"FIX","url":"https://security.gentoo.org/glsa/201602-01"},{"type":"FIX","url":"https://security.gentoo.org/glsa/201604-03"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}