FreeBSD : qemu -- 'drive_init()' Disk Format Security Bypass (8950ac62-1d30-11dd-9388-0211060005df)

medium Nessus Plugin ID 32147

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Secunia reports :

A vulnerability has been reported in QEMU, which can be exploited by malicious, local users to bypass certain security restrictions.

The vulnerability is caused due to the 'drive_init()' function in vl.c determining the format of a disk from data contained in the disk's header. This can be exploited by a malicious user in a guest system to e.g. read arbitrary files on the host by writing a fake header to a raw formatted disk image.

Solution

Update the affected packages.

See Also

http://lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html

http://www.nessus.org/u?0005e535

Plugin Details

Severity: Medium

ID: 32147

File Name: freebsd_pkg_8950ac621d3011dd93880211060005df.nasl

Version: 1.16

Type: local

Published: 5/9/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:qemu, p-cpe:/a:freebsd:freebsd:qemu-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/8/2008

Vulnerability Publication Date: 4/28/2008

Reference Information

CVE: CVE-2008-2004

CWE: 200

Secunia: 30111