Check Point Advisories

QEMU vnc set_pixel_format bits_per_pixel Null Pointer Dereference (CVE-2014-7815)

Check Point Reference: CPAI-2014-2268
Date Published: 2 Dec 2014
Severity: High
Last Updated: Sunday 14 February, 2016
Source: QEMU e6908bfe8e07f2b4
Industry Reference:CVE-2014-7815
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable? QEMU QEMU prior to commit e6908bfe8e07f2b4
Vulnerability Description A null pointer dereference vulnerability has been found in QEMU vnc. The vulnerability is due to insufficient checking of an initialized buffer. A remote attacker could exploit this vulnerability by setting bits_per_pixel to a value that is less than 8. Successful exploitation could lead to a denial of service condition on the guest VM.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the QEMU vnc set_pixel_format bits_per_pixel Null Pointer Dereference protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  RDP Enforcement Violation.
Attack Information:  QEMU vnc set_pixel_format bits_per_pixel Null Pointer Dereference

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK