Debian DSA-2230-1 : qemu-kvm - several vulnerabilities

high Nessus Plugin ID 53605

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities have been discovered in KVM, a solution for full virtualization on x86 hardware :

- CVE-2011-0011 Setting the VNC password to an empty string silently disabled all authentication.

- CVE-2011-1750 The virtio-blk driver performed insufficient validation of read/write I/O from the guest instance, which could lead to denial of service or privilege escalation.

The oldstable distribution (lenny) is not affected by this problem.

Solution

Upgrade the qemu-kvm packages.

For the stable distribution (squeeze), this problem has been fixed in version 0.12.5+dfsg-5+squeeze1.

See Also

https://security-tracker.debian.org/tracker/CVE-2011-0011

https://security-tracker.debian.org/tracker/CVE-2011-1750

https://packages.debian.org/source/squeeze/qemu-kvm

https://www.debian.org/security/2011/dsa-2230

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611134

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624177

Plugin Details

Severity: High

ID: 53605

File Name: debian_DSA-2230.nasl

Version: 1.11

Type: local

Agent: unix

Published: 5/2/2011

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:qemu-kvm, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/Debian/release, Host/Debian/dpkg-l, Host/local_checks_enabled

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/1/2011

Reference Information

CVE: CVE-2011-0011, CVE-2011-1750

BID: 45743, 47546

DSA: 2230