FreeBSD : qemu -- unchecked block read/write vulnerability (9cfbca7f-efb7-11dc-be01-0211060005df)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Ian Jackson reports on the debian-security mailinglist :

When a block device read or write request is made by the guest,
nothing checks that the request is within the range supported by the
backend, but the code in the backend typically assumes that the
request is sensible.

Depending on the backend, this can allow the guest to read and write
arbitrary memory locations in qemu, and possibly gain control over the
qemu process, escaping from the emulation/virtualisation.

See also :

http://lists.debian.org/debian-security/2008/02/msg00064.html
http://www.nessus.org/u?541c03a6

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.7
(CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 31437 (freebsd_pkg_9cfbca7fefb711dcbe010211060005df.nasl)

Bugtraq ID:

CVE ID: CVE-2008-0928

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now