Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2015-3214

Disclosure Date: August 31, 2015
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An out-of-bounds memory access flaw, leading to memory corruption or possibly an information leak, was found in QEMU’s pit_ioport_read() function. A privileged guest user in a QEMU guest, which had QEMU PIT emulation enabled, could potentially, in rare cases, use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

General Information

Vendors

  • Red Hat

Products

  • Red Hat Enterprise Linux 7,
  • Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7,
  • Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7,
  • RHEV 3.X Hypervisor and Agents for RHEL-7

References

Additional Info

Technical Analysis