Debian DSA-3259-1 : qemu - security update (Venom)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.

Synopsis :

The remote Debian host is missing a security-related update.

Description :

Several vulnerabilities were discovered in the qemu virtualisation
solution :

- CVE-2014-9718
It was discovered that the IDE controller emulation is
susceptible to denial of service.

- CVE-2015-1779
Daniel P. Berrange discovered a denial of service
vulnerability in the VNC web socket decoder.

- CVE-2015-2756
Jan Beulich discovered that unmediated PCI command
register could result in denial of service.

- CVE-2015-3456
Jason Geffner discovered a buffer overflow in the
emulated floppy disk drive, resulting in the potential
execution of arbitrary code.

See also :

Solution :

Upgrade the qemu packages.

For the oldstable distribution (wheezy), these problems have been
fixed in version 1.1.2+dfsg-6a+deb7u7 of the qemu source package and
in version 1.1.2+dfsg-6+deb7u7 of the qemu-kvm source package. Only
CVE-2015-3456 affects oldstable.

For the stable distribution (jessie), these problems have been fixed
in version 1:2.1+dfsg-12.

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true

Family: Debian Local Security Checks

Nessus Plugin ID: 83422 ()

Bugtraq ID: 72577

CVE ID: CVE-2014-9718

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now