HIGH · 9.3

CVE-2015-5165

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

Vulnerability Description

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
XenXen<= 4.5.0
FedoraprojectFedora21
SuseLinux Enterprise Debuginfo11
SuseLinux Enterprise Server10
DebianDebian Linux7.0
RedhatOpenstack5.0
RedhatVirtualization3.0
RedhatEnterprise Linux Compute Node Eus7.1
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Eus6.7
RedhatEnterprise Linux Eus Compute Node6.7
RedhatEnterprise Linux For Power Big Endian6.0
RedhatEnterprise Linux For Power Big Endian Eus6.7_ppc64
RedhatEnterprise Linux For Scientific Computing6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Aus7.3
RedhatEnterprise Linux Server Eus7.1
RedhatEnterprise Linux Server Eus From Rhui6.7
RedhatEnterprise Linux Server From Rhui6.0
RedhatEnterprise Linux Server Tus7.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-5165?

CVE-2015-5165 is a vulnerability with a CVSS score of 9.3 (HIGH). The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

How severe is CVE-2015-5165?

CVE-2015-5165 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-5165?

Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen, Fedoraproject Fedora, Suse Linux Enterprise Debuginfo, Suse Linux Enterprise Server, Debian Debian Linux.