CVE-2009-3616

Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
References
Link Resource
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 Broken Link Exploit
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 Broken Link Exploit
http://marc.info/?l=qemu-devel&m=124324043812915 Mailing List
http://rhn.redhat.com/errata/RHEA-2009-1272.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/10/16/5 Mailing List Patch
http://www.openwall.com/lists/oss-security/2009/10/16/8 Mailing List Patch
http://www.securityfocus.com/bid/36716 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=501131 Issue Tracking Patch
https://bugzilla.redhat.com/show_bug.cgi?id=505641 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=508567 Issue Tracking
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5 Broken Link Exploit
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331 Broken Link Exploit
http://marc.info/?l=qemu-devel&m=124324043812915 Mailing List
http://rhn.redhat.com/errata/RHEA-2009-1272.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/10/16/5 Mailing List Patch
http://www.openwall.com/lists/oss-security/2009/10/16/8 Mailing List Patch
http://www.securityfocus.com/bid/36716 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=501131 Issue Tracking Patch
https://bugzilla.redhat.com/show_bug.cgi?id=505641 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=508567 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-10-23 18:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-3616

Mitre link : CVE-2009-3616

CVE.ORG link : CVE-2009-3616


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server

qemu

  • qemu
CWE
CWE-416

Use After Free