mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
25 lines
1.0 KiB
Markdown
25 lines
1.0 KiB
Markdown
### [CVE-2015-5165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Resery/Learning_Note
|
|
- https://github.com/SplendidSky/vm_escape
|
|
- https://github.com/ashishdas009/dynamic-syscall-filtering-for-qemu
|
|
- https://github.com/jiayy/android_vuln_poc-exp
|
|
- https://github.com/mtalbi/vm_escape
|
|
- https://github.com/ray-cp/Vuln_Analysis
|
|
- https://github.com/tina2114/skr_learn_list
|
|
|