FreeBSD : qemu -- Heap overflow in QEMU PCNET controller, allowing guest to host escape (CVE-2015-3209) (acd5d037-1c33-11e5-be9c-6805ca1d3bb1)

high Nessus Plugin ID 84438

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The QEMU security team reports :

A guest which has access to an emulated PCNET network device (e.g.
with 'model=pcnet' in their VIF configuration) can exploit this vulnerability to take over the qemu process elevating its privilege to that of the qemu process.

Solution

Update the affected packages.

See Also

http://xenbits.xen.org/xsa/advisory-135.html

http://www.nessus.org/u?36b01c75

Plugin Details

Severity: High

ID: 84438

File Name: freebsd_pkg_acd5d0371c3311e5be9c6805ca1d3bb1.nasl

Version: 2.6

Type: local

Published: 6/29/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:qemu, p-cpe:/a:freebsd:freebsd:qemu-devel, p-cpe:/a:freebsd:freebsd:qemu-sbruno, p-cpe:/a:freebsd:freebsd:xen-tools, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/26/2015

Vulnerability Publication Date: 4/10/2015

Reference Information

CVE: CVE-2015-3209