Critical severity9.9NVD Advisory· Published Oct 23, 2009· Updated Apr 23, 2026
CVE-2009-3616
CVE-2009-3616
Description
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
Affected products
3- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.openwall.com/lists/oss-security/2009/10/16/5nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2009/10/16/8nvdMailing ListPatch
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatch
- git.savannah.gnu.org/cgit/qemu.git/commit/nvdBroken LinkExploit
- git.savannah.gnu.org/cgit/qemu.git/commit/nvdBroken LinkExploit
- bugzilla.redhat.com/show_bug.cginvdExploitIssue Tracking
- rhn.redhat.com/errata/RHEA-2009-1272.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/36716nvdBroken LinkThird Party AdvisoryVDB Entry
- marc.infonvdMailing List
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
News mentions
0No linked articles in our index yet.