Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3456

EPSS 32.81% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-3456

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
QEMU Floppy Disk Controller 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
QEMU(又名Quick Emulator)是法国程序员法布里斯-贝拉(Fabrice Bellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。 Xen 4.5.x及之前版本和KVM中使用的QEMU 2.3.0及之前版本中的Floppy Disk Controller(FDC)存在安全漏洞。本地虚拟机端攻击者可借助特定的命令(FD_CMD_READ_ID或FD_CMD_DRIVE_SPECIFICATION_COMMAND等)利用该漏洞造成拒绝服务(越边界写入和虚拟机崩溃),或执行任意
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-3456

#POC DescriptionSource LinkShenlong Link
1Experiments related to CVE-2015-3456https://github.com/vincentbernat/cve-2015-3456POC Details
2A VENOM (CVE-2015-3456) Exploit / PoC written in C.https://github.com/orf53975/poisonfrogPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-3456

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-05-13 · 95 CVEs total

CVE-2015-3061Adobe Reader和Acrobat 安全漏洞
CVE-2015-3058Adobe Reader和Acrobat 信息泄露漏洞
CVE-2015-3056Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3052Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3051Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3050Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3049Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3048Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3053Adobe Reader和Acrobat 释放后重用漏洞
CVE-2015-3060Adobe Reader和Acrobat 安全绕过漏洞
CVE-2015-3059Adobe Reader和Acrobat 释放后重用漏洞
CVE-2015-3062Adobe Reader和Acrobat 安全漏洞
CVE-2015-3063Adobe Reader和Acrobat 安全漏洞
CVE-2015-3064Adobe Reader和Acrobat 安全漏洞
CVE-2015-3065Adobe Reader和Acrobat 安全漏洞
CVE-2015-3066Adobe Reader和Acrobat 安全漏洞
CVE-2015-3067Adobe Reader和Acrobat 安全漏洞
CVE-2015-3068Adobe Reader和Acrobat 安全漏洞
CVE-2015-3069Adobe Reader和Acrobat 安全漏洞
CVE-2015-3070Adobe Reader和Acrobat 缓冲区溢出漏洞

Showing top 20 of 95 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-3456

No comments yet


Leave a comment