This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Prasad J Pandit, Red Hat Product Security Team, reports :
Qemu emulator built with the AMD PC-Net II Ethernet Controller support
is vulnerable to a heap buffer overflow flaw. While receiving packets
in the loopback mode, it appends CRC code to the receive buffer. If
the data size given is same as the receive buffer size, the appended
CRC code overwrites 4 bytes beyond this 's->buffer' array.
A privileged(CAP_SYS_RAWIO) user inside guest could use this flaw to
crash the Qemu instance resulting in DoS or potentially execute
arbitrary code with privileges of the Qemu process on the host.
The AMD PC-Net II emulator(hw/net/pcnet.c), while receiving packets
from a remote host(non-loopback mode), fails to validate the received
data size, thus resulting in a buffer overflow issue. It could
potentially lead to arbitrary code execution on the host, with
privileges of the Qemu process. It requires the guest NIC to have
larger MTU limit.
A remote user could use this flaw to crash the guest instance
resulting in DoS or potentially execute arbitrary code on a remote
host with privileges of the Qemu process.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.8