Lucene search

K
freebsdFreeBSD8950AC62-1D30-11DD-9388-0211060005DF
HistoryApr 28, 2008 - 12:00 a.m.

qemu -- "drive_init()" Disk Format Security Bypass

2008-04-2800:00:00
vuxml.freebsd.org
12

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

28.3%

Secunia reports:

A vulnerability has been reported in QEMU, which can be exploited
by malicious, local users to bypass certain security
restrictions.
The vulnerability is caused due to the “drive_init()” function
in vl.c determining the format of a disk from data contained in
the disk’s header. This can be exploited by a malicious user in
a guest system to e.g. read arbitrary files on the host by
writing a fake header to a raw formatted disk image.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchqemu< 0.9.1_6UNKNOWN
FreeBSDanynoarchqemu-devel< 0.9.1_6UNKNOWN

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

28.3%