Mandriva Linux Security Advisory : qemu (MDVSA-2008:162)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Multiple vulnerabilities have been found in Qemu.

Multiple heap-based buffer overflows in the cirrus_invalidate_region
function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and
possibly other products, might allow local users to execute arbitrary
code via unspecified vectors related to attempting to mark
non-existent regions as dirty, aka the bitblt heap overflow.
(CVE-2007-1320)

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used
in Xen and possibly other products, allows local users to trigger a
heap-based buffer overflow via certain register values that bypass
sanity checks, aka QEMU NE2000 receive integer signedness error.
(CVE-2007-1321)

QEMU 0.8.2 allows local users to halt a virtual machine by executing
the icebp instruction. (CVE-2007-1322)

QEMU 0.8.2 allows local users to crash a virtual machine via the
divisor operand to the aam instruction, as demonstrated by aam 0x0,
which triggers a divide-by-zero error. (CVE-2007-1366)

The NE2000 emulator in QEMU 0.8.2 allows local users to execute
arbitrary code by writing Ethernet frames with a size larger than the
MTU to the EN0_TCNT register, which triggers a heap-based buffer
overflow in the slirp library, aka NE2000 mtu heap overflow.
(CVE-2007-5729)

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly
other products, allows local users to execute arbitrary code via
crafted data in the net socket listen option, aka QEMU net socket heap
overflow. (CVE-2007-5730)

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating
system to overwrite the TranslationBlock (code_gen_buffer) buffer, and
probably have unspecified other impacts related to an overflow, via
certain Windows executable programs, as demonstrated by qemu-dos.com.
(CVE-2007-6227)

Qemu 0.9.1 and earlier does not perform range checks for block device
read or write requests, which allows guest host users with root
privileges to access arbitrary memory and escape the virtual machine.
(CVE-2008-0928)

Changing removable media in QEMU could trigger a bug similar to
CVE-2008-2004, which would allow local guest users to read arbitrary
files on the host by modifying the header of the image to identify a
different format. (CVE-2008-1945) See the diskformat: parameter to the
-usbdevice option.

The drive_init function in QEMU 0.9.1 determines the format of a raw
disk image based on the header, which allows local guest users to read
arbitrary files on the host by modifying the header to identify a
different format, which is used when the guest is restarted.
(CVE-2008-2004) See the -format option.

The updated packages have been patched to fix these issues.

Solution :

Update the affected dkms-kqemu, qemu and / or qemu-img packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 37509 (mandriva_MDVSA-2008-162.nasl)

Bugtraq ID: 23731

CVE ID: CVE-2007-1320
CVE-2007-1321
CVE-2007-1322
CVE-2007-1366
CVE-2007-5729
CVE-2007-5730
CVE-2007-6227
CVE-2008-0928
CVE-2008-1945
CVE-2008-2004

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now