FreeBSD : xen-tools -- Unmediated PCI register access in qemu (3d657340-27ea-11e5-a4a5-002590263bf5)

High Nessus Plugin ID 84699


The remote FreeBSD host is missing a security-related update.


The Xen Project reports :

Qemu allows guests to not only read, but also write all parts of the PCI config space (but not extended config space) of passed through PCI devices not explicitly dealt with for (partial) emulation purposes.

Since the effect depends on the specific purpose of the the config space field, it's not possible to give a general statement about the exact impact on the host or other guests. Privilege escalation, host crash (Denial of Service), and leaked information all cannot be excluded.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 84699

File Name: freebsd_pkg_3d65734027ea11e5a4a5002590263bf5.nasl

Version: $Revision: 2.2 $

Type: local

Published: 2015/07/14

Modified: 2017/07/06

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xen-tools, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/07/11

Vulnerability Publication Date: 2015/06/02

Reference Information

CVE: CVE-2015-4106