FreeBSD : qemu -- 'drive_init()' Disk Format Security Bypass (8950ac62-1d30-11dd-9388-0211060005df)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

A vulnerability has been reported in QEMU, which can be exploited by
malicious, local users to bypass certain security restrictions.

The vulnerability is caused due to the 'drive_init()' function in vl.c
determining the format of a disk from data contained in the disk's
header. This can be exploited by a malicious user in a guest system to
e.g. read arbitrary files on the host by writing a fake header to a
raw formatted disk image.

See also :

http://lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html
http://www.nessus.org/u?55e73b41

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 32147 (freebsd_pkg_8950ac621d3011dd93880211060005df.nasl)

Bugtraq ID:

CVE ID: CVE-2008-2004

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now