Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5
git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331
marc.info/?l=qemu-devel&m=124324043812915
rhn.redhat.com/errata/RHEA-2009-1272.html
www.openwall.com/lists/oss-security/2009/10/16/5
www.openwall.com/lists/oss-security/2009/10/16/8
www.securityfocus.com/bid/36716
bugzilla.redhat.com/show_bug.cgi?id=501131
bugzilla.redhat.com/show_bug.cgi?id=505641
bugzilla.redhat.com/show_bug.cgi?id=508567