HTTP: QEMU Floppy Disk Controller Buffer Overflow

This signature detects attempts to exploit a known vulnerability in QEMU Floppy Disk. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted daemon.

Extended Description

The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.

Affected Products

Qemu qemu

References

CVE: CVE-2015-3456

Short Name
HTTP:STC:DL:QEMU-FLOPPY-DISK-OF
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2015-3456 Controller Disk Floppy Overflow QEMU
Release Date
06/01/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Xen

Qemu

Redhat

CVSS Score

7.7

Found a potential security threat?