Debian DSA-3991-1 : qemu - security update

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Debian host is missing a security-related update.

Description :

Multiple vulnerabilities were found in qemu, a fast processor emulator
:

- CVE-2017-9375
Denial of service via memory leak in USB XHCI emulation.

- CVE-2017-12809
Denial of service in the CDROM device drive emulation.

- CVE-2017-13672
Denial of service in VGA display emulation.

- CVE-2017-13711
Denial of service in SLIRP networking support.

- CVE-2017-14167
Incorrect validation of multiboot headers could result
in the execution of arbitrary code.

See also :

https://security-tracker.debian.org/tracker/CVE-2017-9375
https://security-tracker.debian.org/tracker/CVE-2017-12809
https://security-tracker.debian.org/tracker/CVE-2017-13672
https://security-tracker.debian.org/tracker/CVE-2017-13711
https://security-tracker.debian.org/tracker/CVE-2017-14167
https://packages.debian.org/source/stretch/qemu
http://www.debian.org/security/2017/dsa-3991

Solution :

Upgrade the qemu packages.

For the stable distribution (stretch), these problems have been fixed
in version 1:2.8+dfsg-6+deb9u3.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Debian Local Security Checks

Nessus Plugin ID: 103655 ()

Bugtraq ID:

CVE ID: CVE-2017-12809
CVE-2017-13672
CVE-2017-13711
CVE-2017-14167
CVE-2017-9375

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now