FreeBSD : qemu, xen and VirtualBox OSE -- possible VM escape and code execution ('VENOM') (2780e442-fc59-11e4-b18b-6805ca1d3bb1) (Venom)

High Nessus Plugin ID 83510


The remote FreeBSD host is missing one or more security-related updates.


Jason Geffner, CrowdStrike Senior Security Researcher reports :

VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host's local network and adjacent systems.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 83510

File Name: freebsd_pkg_2780e442fc5911e4b18b6805ca1d3bb1.nasl

Version: $Revision: 2.9 $

Type: local

Published: 2015/05/18

Modified: 2015/10/23

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.7

Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:qemu, p-cpe:/a:freebsd:freebsd:qemu-devel, p-cpe:/a:freebsd:freebsd:qemu-sbruno, p-cpe:/a:freebsd:freebsd:virtualbox-ose, p-cpe:/a:freebsd:freebsd:xen-tools, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/05/17

Vulnerability Publication Date: 2015/04/29

Exploitable With

Core Impact

Reference Information

CVE: CVE-2015-3456

IAVA: 2015-A-0115