SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   QEMU Vendors:   QEMU.org
QEMU 'net/slirp.c' Predictable Temporary Filenames Let Local Users Deny Service
SecurityTracker Alert ID:  1032547
SecurityTracker URL:  http://securitytracker.com/id/1032547
CVE Reference:   CVE-2015-4037   (Links to External Site)
Date:  Jun 10 2015
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.3.0; possibly other versions
Description:   A vulnerability was reported in QEMU. A local user can cause denial of service conditions on the target system.

The QEMU user mode networking stack (i.e., SLiRP) creates temporary files with predictable file names when invoked with the '-smb' option. A local user can exploit this to preemptively create temporary files and block slirp from using those filenames.

The vulnerability resides in 'net/slirp.c'.

Kurt Seifried reported this vulnerability.

Impact:   A local user can cause denial of service conditions on the target system.
Solution:   The vendor has issued a source code fix, available at:

http://git.qemu.org/?p=qemu.git;a=commit;h=8b8f1c7e9ddb2e88a144638f6527bf70e32343e3

Vendor URL:  wiki.qemu.org/Main_Page (Links to External Site)
Cause:   Randomization error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 10 2015 (Ubuntu Issues Fix) QEMU 'net/slirp.c' Predictable Temporary Filenames Let Local Users Deny Service
Ubuntu has issued a fix for Ubuntu 12.04 LTS, 14.04 LTS, 14.10, and 15.04.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC