FreeBSD : qemu, xen and VirtualBox OSE -- possible VM escape and code execution ('VENOM') (2780e442-fc59-11e4-b18b-6805ca1d3bb1) (Venom)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Jason Geffner, CrowdStrike Senior Security Researcher reports :

VENOM, CVE-2015-3456, is a security vulnerability in the virtual
floppy drive code used by many computer virtualization platforms. This
vulnerability may allow an attacker to escape from the confines of an
affected virtual machine (VM) guest and potentially obtain
code-execution access to the host. Absent mitigation, this VM escape
could open access to the host system and all other VMs running on that
host, potentially giving adversaries significant elevated access to
the host's local network and adjacent systems.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200255
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200256
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200257
http://venom.crowdstrike.com/
http://www.nessus.org/u?2bd5df81
http://xenbits.xen.org/xsa/advisory-133.html
http://www.nessus.org/u?debcf6d6

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.7
(CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 83510 ()

Bugtraq ID:

CVE ID: CVE-2015-3456

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now