{"containers":{"cna":{"affected":[{"product":"QEMU","vendor":"QEMU","versions":[{"status":"affected","version":"before 2.4.0"}]}],"datePublic":"2015-07-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message."}],"problemTypes":[{"descriptions":[{"description":"Buffer Overflow","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-01-26T13:58:41.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html"},{"tags":["x_refsource_MISC"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html"},{"tags":["x_refsource_MISC"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html"},{"tags":["x_refsource_MISC"],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html"},{"tags":["x_refsource_MISC"],"url":"http://www.openwall.com/lists/oss-security/2015/08/06/3"},{"tags":["x_refsource_MISC"],"url":"http://www.openwall.com/lists/oss-security/2015/08/06/5"},{"tags":["x_refsource_MISC"],"url":"https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295"},{"tags":["x_refsource_MISC"],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T06:59:04.271Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2015/08/06/3"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2015/08/06/5"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2015-5745","datePublished":"2020-01-23T19:35:16.000Z","dateReserved":"2015-08-06T00:00:00.000Z","dateUpdated":"2024-08-06T06:59:04.271Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}