Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61406
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDVSA-2008:162 (qemu)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to qemu
announced via advisory MDVSA-2008:162.

Multiple vulnerabilities have been found in Qemu.

Multiple heap-based buffer overflows in the cirrus_invalidate_region
function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and
possibly other products, might allow local users to execute arbitrary
code via unspecified vectors related to attempting to mark non-existent
regions as dirty, aka the bitblt heap overflow. (CVE-2007-1320)

Integer signedness error in the NE2000 emulator in QEMU 0.8.2,
as used in Xen and possibly other products, allows local users to
trigger a heap-based buffer overflow via certain register values
that bypass sanity checks, aka QEMU NE2000 receive integer signedness
error. (CVE-2007-1321)

QEMU 0.8.2 allows local users to halt a virtual machine by executing
the icebp instruction. (CVE-2007-1322)

QEMU 0.8.2 allows local users to crash a virtual machine via the
divisor operand to the aam instruction, as demonstrated by aam 0x0,
which triggers a divide-by-zero error. (CVE-2007-1366)

The NE2000 emulator in QEMU 0.8.2 allows local users to execute
arbitrary code by writing Ethernet frames with a size larger than
the MTU to the EN0_TCNT register, which triggers a heap-based
buffer overflow in the slirp library, aka NE2000 mtu heap
overflow. (CVE-2007-5729)

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly
other products, allows local users to execute arbitrary code via
crafted data in the net socket listen option, aka QEMU net socket
heap overflow. (CVE-2007-5730)

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating
system to overwrite the TranslationBlock (code_gen_buffer) buffer,
and probably have unspecified other impacts related to an overflow,
via certain Windows executable programs, as demonstrated by
qemu-dos.com. (CVE-2007-6227)

Qemu 0.9.1 and earlier does not perform range checks for block
device read or write requests, which allows guest host users with
root privileges to access arbitrary memory and escape the virtual
machine. (CVE-2008-0928)

Changing removable media in QEMU could trigger a bug similar to
CVE-2008-2004, which would allow local guest users to read arbitrary
files on the host by modifying the header of the image to identify
a different format. (CVE-2008-1945) See the diskformat: parameter to
the -usbdevice option.

The drive_init function in QEMU 0.9.1 determines the format of
a raw disk image based on the header, which allows local guest
users to read arbitrary files on the host by modifying the header
to identify a different format, which is used when the guest is
restarted. (CVE-2008-2004) See the -format option.

The updated packages have been patched to fix these issues.

Affected: 2008.0, 2008.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:162

Risk factor : High

CVSS Score:
7.2

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1320
BugTraq ID: 23731
http://www.securityfocus.com/bid/23731
Debian Security Information: DSA-1284 (Google Search)
http://www.debian.org/security/2007/dsa-1284
Debian Security Information: DSA-1384 (Google Search)
http://www.debian.org/security/2007/dsa-1384
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://taviso.decsystem.org/virtsec.pdf
http://osvdb.org/35494
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://secunia.com/advisories/25073
http://secunia.com/advisories/25095
http://secunia.com/advisories/27047
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27486
http://secunia.com/advisories/29129
http://secunia.com/advisories/30413
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2007/1597
Common Vulnerability Exposure (CVE) ID: CVE-2007-1321
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
http://osvdb.org/35495
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9302
http://securitytracker.com/id?1018761
http://secunia.com/advisories/27072
http://www.attrition.org/pipermail/vim/2007-October/001842.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-1322
http://osvdb.org/35496
XForce ISS Database: qemu-icebp-dos(34043)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34043
Common Vulnerability Exposure (CVE) ID: CVE-2007-1366
http://lists.gnu.org/archive/html/qemu-devel/2007-04/msg00650.html
http://lists.gnu.org/archive/html/qemu-devel/2007-04/msg00651.html
http://osvdb.org/35498
XForce ISS Database: qemu-aam-dos(34046)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34046
Common Vulnerability Exposure (CVE) ID: CVE-2007-5729
http://osvdb.org/42986
XForce ISS Database: qemu-ne2000-code-execution(38238)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38238
Common Vulnerability Exposure (CVE) ID: CVE-2007-5730
http://osvdb.org/42985
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10000
http://www.redhat.com/support/errata/RHSA-2008-0194.html
http://secunia.com/advisories/29963
XForce ISS Database: qemu-net-socket-bo(38239)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38239
Common Vulnerability Exposure (CVE) ID: CVE-2007-6227
BugTraq ID: 26666
http://www.securityfocus.com/bid/26666
Bugtraq: 20071130 QEMU code_gen_buffer overflow POC (Google Search)
http://www.securityfocus.com/archive/1/484429/100/0/threaded
XForce ISS Database: qemu-translationblock-dos(38806)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38806
Common Vulnerability Exposure (CVE) ID: CVE-2008-0928
BugTraq ID: 28001
http://www.securityfocus.com/bid/28001
Debian Security Information: DSA-1799 (Google Search)
http://www.debian.org/security/2009/dsa-1799
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:016
http://marc.info/?l=debian-security&m=120343592917055&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
http://secunia.com/advisories/29081
http://secunia.com/advisories/29136
http://secunia.com/advisories/29172
http://secunia.com/advisories/34642
http://secunia.com/advisories/35031
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2008-2004
BugTraq ID: 29101
http://www.securityfocus.com/bid/29101
http://lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11021
http://secunia.com/advisories/30111
http://secunia.com/advisories/30717
http://secunia.com/advisories/35062
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-776-1
XForce ISS Database: qemu-driveinit-security-bypass(42268)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42268
Common Vulnerability Exposure (CVE) ID: CVE-2008-1945
1020959
http://www.securitytracker.com/id?1020959
30604
http://www.securityfocus.com/bid/30604
32063
http://secunia.com/advisories/32063
32088
http://secunia.com/advisories/32088
34642
35031
35062
DSA-1799
MDVSA-2008:162
RHSA-2008:0892
https://rhn.redhat.com/errata/RHSA-2008-0892.html
SUSE-SR:2009:008
USN-776-1
oval:org.mitre.oval:def:9905
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905
qemu-image-security-bypass(44269)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44269
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.