FreeBSD : qemu -- 'drive_init()' Disk Format Security Bypass (8950ac62-1d30-11dd-9388-0211060005df)

Medium Nessus Plugin ID 32147


The remote FreeBSD host is missing one or more security-related updates.


Secunia reports :

A vulnerability has been reported in QEMU, which can be exploited by malicious, local users to bypass certain security restrictions.

The vulnerability is caused due to the 'drive_init()' function in vl.c determining the format of a disk from data contained in the disk's header. This can be exploited by a malicious user in a guest system to e.g. read arbitrary files on the host by writing a fake header to a raw formatted disk image.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 32147

File Name: freebsd_pkg_8950ac621d3011dd93880211060005df.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2008/05/09

Modified: 2015/05/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:qemu, p-cpe:/a:freebsd:freebsd:qemu-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2008/05/08

Vulnerability Publication Date: 2008/04/28

Reference Information

CVE: CVE-2008-2004

Secunia: 30111

CWE: 200