FreeBSD : qemu -- denial of service vulnerabilities in NE2000 NIC support (6aa3322f-b150-11e5-9728-002590263bf5)

High Nessus Plugin ID 87697

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Prasad J Pandit, Red Hat Product Security Team, reports :

Qemu emulator built with the NE2000 NIC emulation support is vulnerable to an infinite loop issue. It could occur when receiving packets over the network.

A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS.

Qemu emulator built with the NE2000 NIC emulation support is vulnerable to a heap buffer overflow issue. It could occur when receiving packets over the network.

A privileged user inside guest could use this flaw to crash the Qemu instance or potentially execute arbitrary code on the host.

Solution

Update the affected packages.

See Also

https://www.openwall.com/lists/oss-security/2015/09/15/2

https://www.openwall.com/lists/oss-security/2015/09/15/3

http://www.nessus.org/u?5d83a542

http://www.nessus.org/u?3567ff21

http://www.nessus.org/u?80327e0e

http://www.nessus.org/u?974ab7c8

http://www.nessus.org/u?c960ab95

Plugin Details

Severity: High

ID: 87697

File Name: freebsd_pkg_6aa3322fb15011e59728002590263bf5.nasl

Version: 2.3

Type: local

Published: 2016/01/04

Updated: 2018/11/21

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:qemu, p-cpe:/a:freebsd:freebsd:qemu-devel, p-cpe:/a:freebsd:freebsd:qemu-sbruno, p-cpe:/a:freebsd:freebsd:qemu-user-static, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2016/01/02

Vulnerability Publication Date: 2015/09/15

Reference Information

CVE: CVE-2015-5278, CVE-2015-5279