LOW · 3.5

CVE-2015-6815

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of serv...

Vulnerability Description

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.

CVSS Score

3.5

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
LOW

Affected Products

VendorProductVersions
QemuQemu< 2.4.0.1
FedoraprojectFedora21
NovellSuse Linux Enterprise Software Development Kit11.0
NovellSuse Linux Enterprise Debuginfo11.0
NovellSuse Linux Enterprise Desktop11.0
NovellSuse Linux Enterprise Server11.0
CanonicalUbuntu Linux12.04
RedhatOpenstack5.0
RedhatEnterprise Linux5.0
XenXen4.4.3
AristaEos4.12

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-6815?

CVE-2015-6815 is a vulnerability with a CVSS score of 3.5 (LOW). The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of serv...

How severe is CVE-2015-6815?

CVE-2015-6815 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-6815?

Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Fedoraproject Fedora, Novell Suse Linux Enterprise Software Development Kit, Novell Suse Linux Enterprise Debuginfo, Novell Suse Linux Enterprise Desktop.