{"api_version":"1","generated_at":"2026-04-23T06:19:10+00:00","cve":"CVE-2015-3456","urls":{"html":"https://cve.report/CVE-2015-3456","api":"https://cve.report/api/cve/CVE-2015-3456.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-3456","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-3456"},"summary":{"title":"CVE-2015-3456","description":"The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2015-05-13 18:59:00","updated_at":"2023-11-07 02:25:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html","name":"openSUSE-SU-2015:0983","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2015:0983-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.suse.com/security/cve/CVE-2015-3456.html","name":"https://www.suse.com/security/cve/CVE-2015-3456.html","refsource":"CONFIRM","tags":[],"title":"CVE-2015-3456","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0999.html","name":"RHSA-2015:0999","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3274","name":"DSA-3274","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-3274-1 virtualbox","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html","name":"SUSE-SU-2015:0923","refsource":"SUSE","tags":[],"title":"[security-announce] SUSE-SU-2015:0923-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/74640","name":"74640","refsource":"BID","tags":[],"title":"QEMU 'hw/block/fdc.c' VENOM Remote Memory Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html","name":"openSUSE-SU-2015:0894","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2015:0894-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1011.html","name":"RHSA-2015:1011","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10118","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10118","refsource":"CONFIRM","tags":[],"title":"McAfee KnowledgeBase - Intel Security - Security Bulletin: Advanced Threat Defense update for Venom vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/","name":"https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/","refsource":"CONFIRM","tags":[],"title":"VENOM, don’t get bitten. | Red Hat Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032311","name":"1032311","refsource":"SECTRACK","tags":[],"title":"Xen Floppy Disk Controller Emulation Flaw Lets Local Users Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","tags":[],"title":"Oracle Critical Patch Update - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kb.juniper.net/JSA10783","name":"https://kb.juniper.net/JSA10783","refsource":"CONFIRM","tags":[],"title":"2017-04 Security Bulletin: Multiple Vulnerabilities in NorthStar Controller Application before version 2.1.0 Service Pack 1. - Juniper Networks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c","name":"http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c","refsource":"","tags":[],"title":"git.qemu.org Git - qemu.git/commitdiff","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://bto.bluecoat.com/security-advisory/sa95","name":"https://bto.bluecoat.com/security-advisory/sa95","refsource":"CONFIRM","tags":[],"title":"Broadcom Support Portal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/articles/1444903","name":"https://access.redhat.com/articles/1444903","refsource":"CONFIRM","tags":[],"title":"VENOM: QEMU vulnerability (CVE-2015-3456) - Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1000.html","name":"RHSA-2015:1000","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143229451215900&w=2","name":"SSRT102076","refsource":"HP","tags":[],"title":"'[security bulletin] HPSBMU03336 rev.1- HP Helion OpenStack affected by VENOM, Denial of Service (DoS' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html","name":"FEDORA-2015-8249","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 21 Update: qemu-2.1.3-7.fc21","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201612-27","name":"GLSA-201612-27","refsource":"GENTOO","tags":[],"title":"VirtualBox: Multiple vulnerabilities (GLSA 201612-27) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html","name":"openSUSE-SU-2015:1400","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2015:1400-1: moderate: Security update for virtualbox","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2608-1","name":"USN-2608-1","refsource":"UBUNTU","tags":[],"title":"USN-2608-1: QEMU vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032917","name":"1032917","refsource":"SECTRACK","tags":[],"title":"Oracle PeopleSoft Products Lets Local Users Gain Elevated Privileges and Remote Users Partially Access Data and Partially Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032306","name":"1032306","refsource":"SECTRACK","tags":[],"title":"QEMU Floppy Disk Controller Emulation Flaw Lets Local Users Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c","name":"http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c","refsource":"CONFIRM","tags":[],"title":"git.qemu.org Git - qemu.git/commitdiff","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1002.html","name":"RHSA-2015:1002","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10","refsource":"MISC","tags":[],"title":"Arista - Security Advisory 0010","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html","name":"SUSE-SU-2015:0927","refsource":"SUSE","tags":[],"title":"[security-announce] SUSE-SU-2015:0927-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://venom.crowdstrike.com/","name":"http://venom.crowdstrike.com/","refsource":"MISC","tags":[],"title":"VENOM Vulnerability","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability","name":"http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability","refsource":"CONFIRM","tags":[],"title":"FortiGuard","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html","name":"SUSE-SU-2015:0929","refsource":"SUSE","tags":[],"title":"[security-announce] SUSE-SU-2015:0929-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1001.html","name":"RHSA-2015:1001","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://support.lenovo.com/us/en/product_security/venom","name":"https://support.lenovo.com/us/en/product_security/venom","refsource":"CONFIRM","tags":[],"title":"Venom - Lenovo Support (US)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3262","name":"DSA-3262","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-3262-1 xen","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1003.html","name":"RHSA-2015:1003","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1004.html","name":"RHSA-2015:1004","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html","name":"openSUSE-SU-2015:0893","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2015:0893-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201604-03","name":"GLSA-201604-03","refsource":"GENTOO","tags":[],"title":"Xen: Multiple vulnerabilities (GLSA 201604-03) — Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html","name":"SUSE-SU-2015:0896","refsource":"SUSE","tags":[],"title":"Object not found!","mime":"text/xml","httpstatus":"404","archivestatus":"404"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0998.html","name":"RHSA-2015:0998","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143387998230996&w=2","name":"HPSBMU03349","refsource":"HP","tags":[],"title":"'[security bulletin] HPSBMU03349 rev.1- HP Helion CloudSystem, Local Denial of Service (DoS), Arbitra' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://xenbits.xen.org/xsa/advisory-133.html","name":"http://xenbits.xen.org/xsa/advisory-133.html","refsource":"CONFIRM","tags":[],"title":"XSA-133 - Xen Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3259","name":"DSA-3259","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-3259-1 qemu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.citrix.com/article/CTX201078","name":"http://support.citrix.com/article/CTX201078","refsource":"CONFIRM","tags":[],"title":"Citrix Security Advisory for CVE-2015-3456","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm","name":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm","refsource":"CONFIRM","tags":[],"title":"Security Advisory - VENOM Vulnerability in Huawei Products -  Huawei PSIRT","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html","name":"SUSE-SU-2015:0889","refsource":"SUSE","tags":[],"title":"[security-announce] SUSE-SU-2015:0889-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693","refsource":"CONFIRM","tags":[],"title":"2015-07 Security Bulletin: Buffer overflow vulnerability in QEMU component of the KVM/QEMU and Xen hypervisors (CVE-2015-3456) aka VENOM - Juniper Networks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201602-01","name":"GLSA-201602-01","refsource":"GENTOO","tags":[],"title":"QEMU: Multiple vulnerabilities (GLSA 201602-01) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/37053/","name":"37053","refsource":"EXPLOIT-DB","tags":[],"title":"QEMU - Floppy Disk Controller (FDC) (PoC)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-3456","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3456","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"2.3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qemu","cpe5":"qemu","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"enterprise_virtualization","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"enterprise_virtualization","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"openstack","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"4.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"3456","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"4.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-3456","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"37053","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/37053/"},{"name":"1032306","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032306"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"name":"SUSE-SU-2015:0889","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html"},{"name":"https://kb.juniper.net/JSA10783","refsource":"CONFIRM","url":"https://kb.juniper.net/JSA10783"},{"name":"DSA-3259","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3259"},{"name":"SUSE-SU-2015:0929","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html"},{"name":"SUSE-SU-2015:0896","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html"},{"name":"GLSA-201612-27","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201612-27"},{"name":"RHSA-2015:0999","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-0999.html"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10118","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10118"},{"name":"SUSE-SU-2015:0923","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html"},{"name":"RHSA-2015:1001","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1001.html"},{"name":"HPSBMU03336","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143229451215900&w=2"},{"name":"http://support.citrix.com/article/CTX201078","refsource":"CONFIRM","url":"http://support.citrix.com/article/CTX201078"},{"name":"http://xenbits.xen.org/xsa/advisory-133.html","refsource":"CONFIRM","url":"http://xenbits.xen.org/xsa/advisory-133.html"},{"name":"RHSA-2015:1003","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1003.html"},{"name":"openSUSE-SU-2015:0893","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html"},{"name":"1032917","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032917"},{"name":"HPSBMU03349","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143387998230996&w=2"},{"name":"RHSA-2015:0998","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-0998.html"},{"name":"https://www.suse.com/security/cve/CVE-2015-3456.html","refsource":"CONFIRM","url":"https://www.suse.com/security/cve/CVE-2015-3456.html"},{"name":"openSUSE-SU-2015:0894","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html"},{"name":"FEDORA-2015-8249","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html"},{"name":"https://bto.bluecoat.com/security-advisory/sa95","refsource":"CONFIRM","url":"https://bto.bluecoat.com/security-advisory/sa95"},{"name":"RHSA-2015:1004","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1004.html"},{"name":"http://venom.crowdstrike.com/","refsource":"MISC","url":"http://venom.crowdstrike.com/"},{"name":"RHSA-2015:1011","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1011.html"},{"name":"https://support.lenovo.com/us/en/product_security/venom","refsource":"CONFIRM","url":"https://support.lenovo.com/us/en/product_security/venom"},{"name":"SUSE-SU-2015:0927","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html"},{"name":"http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c","refsource":"CONFIRM","url":"http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c"},{"name":"GLSA-201604-03","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201604-03"},{"name":"RHSA-2015:1002","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1002.html"},{"name":"USN-2608-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2608-1"},{"name":"https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/","refsource":"CONFIRM","url":"https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/"},{"name":"openSUSE-SU-2015:0983","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693"},{"name":"1032311","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032311"},{"name":"SSRT102076","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143229451215900&w=2"},{"name":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm","refsource":"CONFIRM","url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm"},{"name":"DSA-3262","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3262"},{"name":"GLSA-201602-01","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201602-01"},{"name":"openSUSE-SU-2015:1400","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html"},{"name":"74640","refsource":"BID","url":"http://www.securityfocus.com/bid/74640"},{"name":"DSA-3274","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3274"},{"name":"http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability","refsource":"CONFIRM","url":"http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability"},{"name":"https://access.redhat.com/articles/1444903","refsource":"CONFIRM","url":"https://access.redhat.com/articles/1444903"},{"name":"RHSA-2015:1000","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1000.html"},{"refsource":"MISC","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10"}]}},"nvd":{"publishedDate":"2015-05-13 18:59:00","lastModifiedDate":"2023-11-07 02:25:00","problem_types":["CWE-119"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:L/Au:S/C:C/I:C/A:C","accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.7},"severity":"HIGH","exploitabilityScore":5.1,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","versionEndIncluding":"2.3.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"3456","Ordinal":"80411","Title":"CVE-2015-3456","CVE":"CVE-2015-3456","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"3456","Ordinal":"1","NoteData":"The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.","Type":"Description","Title":null},{"CveYear":"2015","CveId":"3456","Ordinal":"2","NoteData":"2015-05-13","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"3456","Ordinal":"3","NoteData":"2021-11-05","Type":"Other","Title":"Modified"}]}}}