High severity8.6NVD Advisory· Published Jan 12, 2016· Updated May 6, 2026
CVE-2015-1779
CVE-2015-1779
Description
The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
Affected products
29- cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.htmlnvdMailing ListPatchThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.htmlnvdMailing ListPatchThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1931.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1943.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3259nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/03/24/9nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2015/04/09/6nvdMailing ListThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/73303nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1033975nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2608-1nvdThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.htmlnvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/201602-01nvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.htmlnvdBroken Link
- lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.htmlnvdBroken Link
News mentions
0No linked articles in our index yet.