Check Point Reference: | CPAI-2014-2268 |
Date Published: | 2 Dec 2014 |
Severity: | High |
Last Updated: | Sunday 14 February, 2016 |
Source: | QEMU e6908bfe8e07f2b4 |
Industry Reference: | CVE-2014-7815 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | QEMU QEMU prior to commit e6908bfe8e07f2b4 |
Vulnerability Description | A null pointer dereference vulnerability has been found in QEMU vnc. The vulnerability is due to insufficient checking of an initialized buffer. A remote attacker could exploit this vulnerability by setting bits_per_pixel to a value that is less than 8. Successful exploitation could lead to a denial of service condition on the guest VM. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: RDP Enforcement Violation.
Attack Information: QEMU vnc set_pixel_format bits_per_pixel Null Pointer Dereference