Mandriva Linux Security Advisory : qemu (MDVSA-2015:210)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated qemu packages fix security vulnerabilities :

A denial of service flaw was found in the way QEMU handled malformed
Physical Region Descriptor Table (PRDT) data sent to the host's IDE
and/or AHCI controller emulation. A privileged guest user could use
this flaw to crash the system (rhbz#1204919).

It was found that the QEMU's websocket frame decoder processed
incoming frames without limiting resources used to process the header
and the payload. An attacker able to access a guest's VNC console
could use this flaw to trigger a denial of service on the host by
exhausting all available memory and CPU (CVE-2015-1779).

See also :

http://advisories.mageia.org/MGASA-2015-0149.html

Solution :

Update the affected qemu and / or qemu-img packages.

Risk factor :

High

Family: Mandriva Local Security Checks

Nessus Plugin ID: 83102 ()

Bugtraq ID:

CVE ID: CVE-2015-1779

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now