Vulnerability Details CVE-2015-5165
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.145
EPSS Ranking 94.1%
CVSS Severity
CVSS v2 Score 9.3
Products affected by CVE-2015-5165
-
cpe:2.3:a:redhat:openstack:5.0
-
cpe:2.3:a:redhat:openstack:6.0
-
cpe:2.3:a:redhat:virtualization:3.0
-
cpe:2.3:a:suse:linux_enterprise_debuginfo:11
-
cpe:2.3:o:arista:eos:4.12
-
cpe:2.3:o:arista:eos:4.13
-
cpe:2.3:o:arista:eos:4.14
-
cpe:2.3:o:arista:eos:4.15
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:fedoraproject:fedora:21
-
cpe:2.3:o:fedoraproject:fedora:22
-
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.1
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.2
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.3
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.7
-
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
-
cpe:2.3:o:redhat:enterprise_linux_eus:6.7
-
cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:6.7
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64
-
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0
-
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server:6.0
-
cpe:2.3:o:redhat:enterprise_linux_server:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7
-
cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:6.7
-
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0
-
cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.2
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7
-
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
-
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
-
cpe:2.3:o:suse:linux_enterprise_server:10
-
cpe:2.3:o:suse:linux_enterprise_server:11
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:o:xen:xen:4.1.6.1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-