Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.842220
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-2608-1)
Summary:The remote host is missing an update for the 'qemu, qemu-kvm' package(s) announced via the USN-2608-1 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu, qemu-kvm' package(s) announced via the USN-2608-1 advisory.

Vulnerability Insight:
Jason Geffner discovered that QEMU incorrectly handled the virtual floppy
driver. This issue is known as VENOM. A malicious guest could use this
issue to cause a denial of service, or possibly execute arbitrary code on
the host as the user running the QEMU process. In the default installation,
when QEMU is used with libvirt, attackers would be isolated by the libvirt
AppArmor profile. (CVE-2015-3456)

Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets.
A remote attacker could use this issue to cause QEMU to consume memory,
resulting in a denial of service. This issue only affected Ubuntu 14.04
LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779)

Jan Beulich discovered that QEMU, when used with Xen, didn't properly
restrict access to PCI command registers. A malicious guest could use this
issue to cause a denial of service. This issue only affected Ubuntu 14.04
LTS and Ubuntu 14.10. (CVE-2015-2756)

Affected Software/OS:
'qemu, qemu-kvm' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 14.10, Ubuntu 15.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-1779
1033975
http://www.securitytracker.com/id/1033975
73303
http://www.securityfocus.com/bid/73303
DSA-3259
http://www.debian.org/security/2015/dsa-3259
FEDORA-2015-5482
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
FEDORA-2015-5541
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
GLSA-201602-01
https://security.gentoo.org/glsa/201602-01
RHSA-2015:1931
http://rhn.redhat.com/errata/RHSA-2015-1931.html
RHSA-2015:1943
http://rhn.redhat.com/errata/RHSA-2015-1943.html
SUSE-SU-2015:0870
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
SUSE-SU-2015:0896
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
USN-2608-1
http://www.ubuntu.com/usn/USN-2608-1
[Qemu-devel] 20150323 [PATCH 0/2] CVE-2015-1779: fix denial of service in VNC websockets
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
[Qemu-devel] 20150323 [PATCH 1/2] CVE-2015-1779: incrementally decode websocket frames
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
[Qemu-devel] 20150323 [PATCH 2/2] CVE-2015-1779: limit size of HTTP headers from websockets clients
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
[oss-security] 20150324 CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
http://www.openwall.com/lists/oss-security/2015/03/24/9
[oss-security] 20150409 Re: CVE-2015-1779 qemu: vnc: insufficient resource limiting in VNC websockets decoder
http://www.openwall.com/lists/oss-security/2015/04/09/6
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-2756
BugTraq ID: 72577
http://www.securityfocus.com/bid/72577
Debian Security Information: DSA-3259 (Google Search)
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154574.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155198.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154579.html
https://security.gentoo.org/glsa/201504-04
http://lists.nongnu.org/archive/html/qemu-devel/2015-03/msg06179.html
http://www.securitytracker.com/id/1031998
SuSE Security Announcement: openSUSE-SU-2015:0732 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3456
BugTraq ID: 74640
http://www.securityfocus.com/bid/74640
Debian Security Information: DSA-3262 (Google Search)
http://www.debian.org/security/2015/dsa-3262
Debian Security Information: DSA-3274 (Google Search)
http://www.debian.org/security/2015/dsa-3274
https://www.exploit-db.com/exploits/37053/
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html
https://security.gentoo.org/glsa/201604-03
https://security.gentoo.org/glsa/201612-27
HPdes Security Advisory: HPSBMU03336
http://marc.info/?l=bugtraq&m=143229451215900&w=2
HPdes Security Advisory: HPSBMU03349
http://marc.info/?l=bugtraq&m=143387998230996&w=2
HPdes Security Advisory: SSRT102076
http://venom.crowdstrike.com/
https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
RedHat Security Advisories: RHSA-2015:0998
http://rhn.redhat.com/errata/RHSA-2015-0998.html
RedHat Security Advisories: RHSA-2015:0999
http://rhn.redhat.com/errata/RHSA-2015-0999.html
RedHat Security Advisories: RHSA-2015:1000
http://rhn.redhat.com/errata/RHSA-2015-1000.html
RedHat Security Advisories: RHSA-2015:1001
http://rhn.redhat.com/errata/RHSA-2015-1001.html
RedHat Security Advisories: RHSA-2015:1002
http://rhn.redhat.com/errata/RHSA-2015-1002.html
RedHat Security Advisories: RHSA-2015:1003
http://rhn.redhat.com/errata/RHSA-2015-1003.html
RedHat Security Advisories: RHSA-2015:1004
http://rhn.redhat.com/errata/RHSA-2015-1004.html
RedHat Security Advisories: RHSA-2015:1011
http://rhn.redhat.com/errata/RHSA-2015-1011.html
http://www.securitytracker.com/id/1032306
http://www.securitytracker.com/id/1032311
http://www.securitytracker.com/id/1032917
SuSE Security Announcement: SUSE-SU-2015:0889 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html
SuSE Security Announcement: SUSE-SU-2015:0896 (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0923 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
SuSE Security Announcement: SUSE-SU-2015:0927 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html
SuSE Security Announcement: SUSE-SU-2015:0929 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
SuSE Security Announcement: openSUSE-SU-2015:0893 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html
SuSE Security Announcement: openSUSE-SU-2015:0894 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html
SuSE Security Announcement: openSUSE-SU-2015:0983 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html
SuSE Security Announcement: openSUSE-SU-2015:1400 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.