FreeBSD : qemu -- denial of service vulnerability (a228c7a0-ba66-11e6-b1cf-14dae9d210b8)
2016-12-05T00:00:00
ID FREEBSD_PKG_A228C7A0BA6611E6B1CF14DAE9D210B8.NASL Type nessus Reporter This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2016-12-05T00:00:00
Description
Daniel P. Berrange reports :
The VNC server websockets decoder will read and buffer data from
websockets clients until it sees the end of the HTTP headers, as
indicated by \r\n\r\n. In theory this allows a malicious to trick QEMU
into consuming an arbitrary amount of RAM.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the FreeBSD VuXML database :
#
# Copyright 2003-2018 Jacques Vidrine and contributors
#
# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
# HTML, PDF, PostScript, RTF and so forth) with or without modification,
# are permitted provided that the following conditions are met:
# 1. Redistributions of source code (VuXML) must retain the above
# copyright notice, this list of conditions and the following
# disclaimer as the first lines of this file unmodified.
# 2. Redistributions in compiled form (transformed to other DTDs,
# published online in any format, converted to PDF, PostScript,
# RTF and other formats) must reproduce the above copyright
# notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
#
# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(95512);
script_version("3.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2015-1779");
script_name(english:"FreeBSD : qemu -- denial of service vulnerability (a228c7a0-ba66-11e6-b1cf-14dae9d210b8)");
script_summary(english:"Checks for updated packages in pkg_info output");
script_set_attribute(
attribute:"synopsis",
value:
"The remote FreeBSD host is missing one or more security-related
updates."
);
script_set_attribute(
attribute:"description",
value:
"Daniel P. Berrange reports :
The VNC server websockets decoder will read and buffer data from
websockets clients until it sees the end of the HTTP headers, as
indicated by \r\n\r\n. In theory this allows a malicious to trick QEMU
into consuming an arbitrary amount of RAM."
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206725"
);
# https://vuxml.freebsd.org/freebsd/a228c7a0-ba66-11e6-b1cf-14dae9d210b8.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?78755d43"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:qemu");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:qemu-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:qemu-sbruno");
script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/03/23");
script_set_attribute(attribute:"patch_publication_date", value:"2016/12/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/12/05");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"FreeBSD Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
exit(0);
}
include("audit.inc");
include("freebsd_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (pkg_test(save_report:TRUE, pkg:"qemu<2.3.0")) flag++;
if (pkg_test(save_report:TRUE, pkg:"qemu-devel<2.3.0")) flag++;
if (pkg_test(save_report:TRUE, pkg:"qemu-sbruno<2.3.0")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "FREEBSD_PKG_A228C7A0BA6611E6B1CF14DAE9D210B8.NASL", "bulletinFamily": "scanner", "title": "FreeBSD : qemu -- denial of service vulnerability (a228c7a0-ba66-11e6-b1cf-14dae9d210b8)", "description": "Daniel P. Berrange reports :\n\nThe VNC server websockets decoder will read and buffer data from\nwebsockets clients until it sees the end of the HTTP headers, as\nindicated by \\r\\n\\r\\n. In theory this allows a malicious to trick QEMU\ninto consuming an arbitrary amount of RAM.", "published": "2016-12-05T00:00:00", "modified": "2016-12-05T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "href": "https://www.tenable.com/plugins/nessus/95512", "reporter": "This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?78755d43", "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html", "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206725"], "cvelist": ["CVE-2015-1779"], "type": "nessus", "lastseen": "2021-01-06T10:56:44", "edition": 25, "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2015-1779"]}, {"type": "suse", "idList": ["SUSE-SU-2016:1318-1", "SUSE-SU-2015:0870-1", "SUSE-SU-2016:0955-1", "OPENSUSE-SU-2016:0914-1", "SUSE-SU-2015:0896-1", "OPENSUSE-SU-2016:0995-1", "SUSE-SU-2016:0873-1"]}, {"type": "fedora", "idList": ["FEDORA:D999B601454A", "FEDORA:6D23360762AF", "FEDORA:EBA7060877F8", "FEDORA:327666015E56"]}, {"type": "nessus", "idList": ["SUSE_11_KVM-150428.NASL", "ORACLELINUX_ELSA-2015-1943.NASL", "MANDRIVA_MDVSA-2015-210.NASL", "REDHAT-RHSA-2015-1931.NASL", "FEDORA_2015-5541.NASL", "SL_20151027_QEMU_KVM_ON_SL7_X.NASL", "REDHAT-RHSA-2015-1943.NASL", "FEDORA_2015-5482.NASL", "UBUNTU_USN-2608-1.NASL", "CENTOS_RHSA-2015-1943.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14442", "SECURITYVULNS:DOC:31996", "SECURITYVULNS:DOC:32124"]}, {"type": "centos", "idList": ["CESA-2015:1943"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310842220", "OPENVAS:703259", "OPENVAS:1361412562310122730", "OPENVAS:1361412562310882309", "OPENVAS:1361412562310850774", "OPENVAS:1361412562310869552", "OPENVAS:1361412562310869238", "OPENVAS:1361412562310871466", "OPENVAS:1361412562310850916", "OPENVAS:1361412562310703259"]}, {"type": "redhat", "idList": ["RHSA-2015:1943", "RHSA-2015:1931"]}, {"type": "oraclelinux", "idList": ["ELSA-2015-1943"]}, {"type": "freebsd", "idList": ["A228C7A0-BA66-11E6-B1CF-14DAE9D210B8"]}, {"type": "ubuntu", "idList": ["USN-2608-1"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3259-1:EB11E"]}, {"type": "gentoo", "idList": ["GLSA-201602-01"]}], "modified": "2021-01-06T10:56:44", "rev": 2}, "score": {"value": 6.4, "vector": "NONE", "modified": "2021-01-06T10:56:44", "rev": 2}, "vulnersScore": 6.4}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(95512);\n script_version(\"3.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2015-1779\");\n\n script_name(english:\"FreeBSD : qemu -- denial of service vulnerability (a228c7a0-ba66-11e6-b1cf-14dae9d210b8)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Daniel P. Berrange reports :\n\nThe VNC server websockets decoder will read and buffer data from\nwebsockets clients until it sees the end of the HTTP headers, as\nindicated by \\r\\n\\r\\n. In theory this allows a malicious to trick QEMU\ninto consuming an arbitrary amount of RAM.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206725\"\n );\n # https://vuxml.freebsd.org/freebsd/a228c7a0-ba66-11e6-b1cf-14dae9d210b8.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78755d43\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:qemu-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:qemu-sbruno\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/03/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/12/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"qemu<2.3.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"qemu-devel<2.3.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"qemu-sbruno<2.3.0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "FreeBSD Local Security Checks", "pluginID": "95512", "cpe": ["p-cpe:/a:freebsd:freebsd:qemu-devel", "p-cpe:/a:freebsd:freebsd:qemu-sbruno", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:qemu"], "scheme": null, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}}
{"cve": [{"lastseen": "2020-12-09T20:03:01", "description": "The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 8.6, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 4.0}, "published": "2016-01-12T19:59:00", "title": "CVE-2015-1779", "type": "cve", "cwe": ["CWE-400"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1779"], "modified": "2020-09-09T15:13:00", "cpe": ["cpe:/o:redhat:enterprise_linux_server_tus:7.6", "cpe:/a:qemu:qemu:2.3.0", "cpe:/o:redhat:enterprise_linux_eus:7.3", "cpe:/o:redhat:enterprise_linux_eus:7.1", "cpe:/o:redhat:enterprise_linux_server_aus:7.3", "cpe:/o:redhat:enterprise_linux_eus:7.2", "cpe:/o:redhat:enterprise_linux_eus:7.7", "cpe:/a:redhat:virtualization:3.0", "cpe:/o:canonical:ubuntu_linux:15.04", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:fedoraproject:fedora:21", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:redhat:enterprise_linux_eus:7.4", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux_eus:7.6", "cpe:/o:redhat:enterprise_linux_server_aus:7.4", "cpe:/o:redhat:enterprise_linux_server_aus:7.6", "cpe:/o:redhat:enterprise_linux_server_tus:7.7", "cpe:/o:canonical:ubuntu_linux:14.10", "cpe:/o:redhat:enterprise_linux_workstation:7.0", "cpe:/a:qemu:qemu:2.2.1", "cpe:/o:redhat:enterprise_linux_server_tus:7.3", "cpe:/o:redhat:enterprise_linux_server_aus:7.7", "cpe:/o:debian:debian_linux:7.0", "cpe:/o:oracle:linux:7", "cpe:/o:fedoraproject:fedora:22", "cpe:/o:redhat:enterprise_linux_eus:7.5", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "CVE-2015-1779", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1779", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"]}], "suse": [{"lastseen": "2016-09-04T11:50:21", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "This update for KVM fixes an issue in the virtio-blk driver which could\n result in incorrectly setting its WCE configuration. Under some\n circumstances, this misconfiguration could cause severe file system\n corruption, because cache flushes were not generated as they ought to have\n been.\n\n The update also addresses one security vulnerability:\n\n * CVE-2015-1779: Insufficient resource limiting in VNC websockets\n decoder. (bsc#924018)\n\n Security Issues:\n\n * CVE-2015-1779\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779</a>>\n\n", "edition": 1, "modified": "2015-05-13T22:04:49", "published": "2015-05-13T22:04:49", "id": "SUSE-SU-2015:0870-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html", "title": "Security update for kvm (important)", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:57:27", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779", "CVE-2015-3456"], "description": "qemu / kvm was updated to fix a security issue and some bugs.\n\n Security issue fixed:\n\n * CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,\n which could be used to denial of service attacks or potential code\n execution against the host.\n\n * CVE-2015-1779: Fixed insufficient resource limiting in the VNC\n websockets decoder.\n\n\n Bugs fixed:\n - qemu truncates vhd images in virt-rescue (bsc#886378)\n\n - Update kvm-supported.txt with the current rbd support status.\n\n - enable rbd build on x86_64 (qemu-block-rbd package) (FATE#318349)\n\n", "edition": 1, "modified": "2015-05-18T17:05:01", "published": "2015-05-18T17:05:01", "id": "SUSE-SU-2015:0896-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html", "title": "Security update for qemu (important)", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:17:56", "bulletinFamily": "unix", "cvelist": ["CVE-2016-2392", "CVE-2014-3689", "CVE-2014-9718", "CVE-2016-1570", "CVE-2015-8619", "CVE-2015-6855", "CVE-2015-8613", "CVE-2013-4533", "CVE-2015-1779", "CVE-2014-0222", "CVE-2016-2391", "CVE-2015-7512", "CVE-2015-8345", "CVE-2016-2198", "CVE-2014-7815", "CVE-2013-4537", "CVE-2015-8744", "CVE-2015-8743", "CVE-2016-1568", "CVE-2013-4539", "CVE-2015-8745", "CVE-2016-1714", "CVE-2016-1981", "CVE-2016-2538", "CVE-2013-4538", "CVE-2015-5278"], "description": "xen was updated to fix 26 security issues.\n\n These security issues were fixed:\n - CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in\n hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or\n possibly execute arbitrary code via a crafted s->rx_level value in a\n savevm image (bsc#864655).\n - CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed\n remote attackers to execute arbitrary code via a crafted arglen value in\n a savevm image (bsc#864391).\n - CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in\n hw/display/ssd0323.c allowed remote attackers to cause a denial of\n service (memory corruption) or possibly execute arbitrary code via\n crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and\n row_end values; or (5) col_star and col_end values in a savevm image\n (bsc#864769).\n - CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in\n hw/input/tsc210x.c might have allowed remote attackers to execute\n arbitrary code via a crafted (1) precision, (2) nextprecision, (3)\n function, or (4) nextfunction value in a savevm image (bsc#864805).\n - CVE-2014-0222: Integer overflow in the qcow_open function in\n block/qcow.c allowed remote attackers to cause a denial of service\n (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).\n - CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed\n local guest users to write to qemu memory locations and gain privileges\n via unspecified parameters related to rectangle handling (bsc#901508).\n - CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote\n attackers to cause a denial of service (crash) via a small\n bytes_per_pixel value (bsc#902737).\n - CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE\n functionality had multiple interpretations of a function's return value,\n which allowed guest OS users to cause a host OS denial of service\n (memory consumption or infinite loop, and system crash) via a PRDT with\n zero complete sectors, related to the bmdma_prepare_buf and\n ahci_dma_prepare_buf functions (bsc#928393).\n - CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers\n to cause a denial of service (memory and CPU consumption) via a large\n (1) websocket payload or (2) HTTP headers section (bsc#924018).\n - CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).\n - CVE-2015-6855: hw/ide/core.c did not properly restrict the commands\n accepted by an ATAPI device, which allowed guest users to cause a denial\n of service or possibly have unspecified other impact via certain IDE\n commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty\n drive, which triggers a divide-by-zero error and instance crash\n (bsc#945404).\n - CVE-2015-7512: Buffer overflow in the pcnet_receive function in\n hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote\n attackers to cause a denial of service (guest OS crash) or execute\n arbitrary code via a large packet (bsc#957162).\n - CVE-2015-8345: eepro100: infinite loop in processing command block list\n (bsc#956829).\n - CVE-2015-8613: SCSI: stack based buffer overflow in\n megasas_ctrl_get_info (bsc#961358).\n - CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).\n - CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions\n (bsc#960725).\n - CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash\n via assert(2) call (bsc#960835).\n - CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call\n (bsc#960707).\n - CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands\n (bsc#961332).\n - CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed\n local PV guests to obtain sensitive information, cause a denial of\n service, gain privileges, or have unspecified other impact via a crafted\n page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2)\n MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3)\n unknown vectors related to page table updates (bsc#960861).\n - CVE-2016-1714: nvram: OOB r/w access in processing firmware\n configurations (bsc#961691).\n - CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov\n routines (bsc#963782).\n - CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write\n (bsc#964413).\n - CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL\n pointer dereference (bsc#967013).\n - CVE-2016-2392: NULL pointer dereference in remote NDIS control message\n handling (bsc#967012).\n - CVE-2016-2538: Integer overflow in remote NDIS control message handling\n (bsc#967969).\n\n These non-security issues were fixed:\n - bsc#954872: script block-dmmd not working as expected\n - bsc#957698: DOM0 can't bring up on Dell PC\n - bsc#963923: domain weights not honored when sched-credit tslice is\n reduced\n - bsc#959332: SLES12SP1 PV guest is unreachable when restored or migrated\n - bsc#959695: Missing docs for xen\n\n", "edition": 1, "modified": "2016-03-30T20:07:33", "published": "2016-03-30T20:07:33", "id": "OPENSUSE-SU-2016:0914-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html", "type": "suse", "title": "Security update for xen (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:37:04", "bulletinFamily": "unix", "cvelist": ["CVE-2016-2392", "CVE-2014-3689", "CVE-2014-9718", "CVE-2016-1570", "CVE-2015-8619", "CVE-2016-2270", "CVE-2015-6855", "CVE-2015-8613", "CVE-2013-4533", "CVE-2015-1779", "CVE-2014-0222", "CVE-2015-7512", "CVE-2015-8345", "CVE-2016-2198", "CVE-2014-7815", "CVE-2013-4534", "CVE-2013-4537", "CVE-2015-8744", "CVE-2015-8743", "CVE-2016-1568", "CVE-2013-4539", "CVE-2015-8745", "CVE-2016-1714", "CVE-2016-1981", "CVE-2015-6815", "CVE-2015-5239", "CVE-2016-2538", "CVE-2016-2271", "CVE-2013-4530", "CVE-2013-4538", "CVE-2013-4529", "CVE-2015-5278", "CVE-2016-1571"], "description": "xen was updated to version 4.4.4 to fix 33 security issues.\n\n These security issues were fixed:\n - CVE-2016-2392: NULL pointer dereference in remote NDIS control message\n handling (bsc#967012).\n - CVE-2015-5239: Integer overflow in vnc_client_read() and\n protocol_client_msg() (bsc#944463).\n - CVE-2016-2270: Xen allowed local guest administrators to cause a denial\n of service (host reboot) via vectors related to multiple mappings of\n MMIO pages with different cachability settings (boo#965315).\n - CVE-2016-2538: Integer overflow in remote NDIS control message handling\n (bsc#967969).\n - CVE-2015-7512: Buffer overflow in the pcnet_receive function in\n hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote\n attackers to cause a denial of service (guest OS crash) or execute\n arbitrary code via a large packet (boo#962360).\n - CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed\n local guest users to write to qemu memory locations and gain privileges\n via unspecified parameters related to rectangle handling (boo#962611).\n - CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).\n - CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands\n (bsc#961332).\n - CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov\n routines (bsc#963782).\n - CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write\n (bsc#964413).\n - CVE-2015-6815: e1000: infinite loop issue (bsc#944697).\n - CVE-2014-0222: Integer overflow in the qcow_open function in\n block/qcow.c allowed remote attackers to cause a denial of service\n (crash) via a large L2 table in a QCOW version 1 image (boo#964925).\n - CVE-2015-6855: hw/ide/core.c did not properly restrict the commands\n accepted by an ATAPI device, which allowed guest users to cause a denial\n of service or possibly have unspecified other impact via certain IDE\n commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty\n drive, which triggers a divide-by-zero error and instance crash\n (boo#965156).\n - CVE-2016-2271: VMX in using an Intel or Cyrix CPU, allowed local HVM\n guest users to cause a denial of service (guest crash) via vectors\n related to a non-canonical RIP (boo#965317).\n - CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via vectors related to IRQDest elements (boo#964452).\n - CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed\n remote attackers to execute arbitrary code via a crafted arglen value in\n a savevm image (boo#962642).\n - CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers\n to cause a denial of service (memory and CPU consumption) via a large\n (1) websocket payload or (2) HTTP headers section (boo#962632).\n - CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via crafted tx_fifo_head and rx_fifo_head values in a savevm image\n (boo#964950).\n - CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in\n hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or\n possibly execute arbitrary code via a crafted s->rx_level value in a\n savevm image (boo#964644).\n - CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in\n hw/input/tsc210x.c allowed remote attackers to execute arbitrary code\n via a crafted (1) precision, (2) nextprecision, (3) function, or (4)\n nextfunction value in a savevm image (boo#962758).\n - CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in\n hw/display/ssd0323.c allowed remote attackers to cause a denial of\n service (memory corruption) or possibly execute arbitrary code via\n crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and\n row_end values; or (5) col_star and col_end values in a savevm image\n (boo#962335).\n - CVE-2015-8345: eepro100: infinite loop in processing command block list\n (bsc#956829).\n - CVE-2015-8613: scsi: stack based buffer overflow in\n megasas_ctrl_get_info (bsc#961358).\n - CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).\n - CVE-2016-1571: The paging_invlpg function in include/asm-x86/paging.h,\n when using shadow mode paging or nested virtualization is enabled,\n allowed local HVM guest users to cause a denial of service (host crash)\n via a non-canonical guest address in an INVVPID instruction, which\n triggers a hypervisor bug check (boo#960862).\n - CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed\n local PV guests to obtain sensitive information, cause a denial of\n service, gain privileges, or have unspecified other impact via a crafted\n page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2)\n MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3)\n unknown vectors related to page table updates (boo#960861).\n - CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE\n functionality had multiple interpretations of a function's return value,\n which allowed guest OS users to cause a host OS denial of service\n (memory consumption or infinite loop, and system crash) via a PRDT with\n zero complete sectors, related to the bmdma_prepare_buf and\n ahci_dma_prepare_buf functions (boo#964431).\n - CVE-2016-1714: nvram: OOB r/w access in processing firmware\n configurations (bsc#961691).\n - CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions\n (bsc#960725).\n - CVE-2015-8744: vmxnet3: incorrect l2 header validation leads to a crash\n via assert(2) call (bsc#960835).\n - CVE-2015-8745: Reading IMR registers could have lead to a crash via\n assert(2) call (bsc#960707).\n - CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote\n attackers to cause a denial of service (crash) via a small\n bytes_per_pixel value (boo#962627).\n - CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote\n attackers to cause a denial of service and possibly execute arbitrary\n code via a large log_num value in a savevm image (boo#964929).\n\n", "edition": 1, "modified": "2016-04-08T19:10:29", "published": "2016-04-08T19:10:29", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html", "id": "OPENSUSE-SU-2016:0995-1", "title": "Security update for xen (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:49:45", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8567", "CVE-2016-2392", "CVE-2014-3689", "CVE-2014-9718", "CVE-2016-1570", "CVE-2015-8619", "CVE-2015-8558", "CVE-2016-2270", "CVE-2015-6855", "CVE-2015-8613", "CVE-2016-1922", "CVE-2013-4533", "CVE-2015-1779", "CVE-2015-8817", "CVE-2014-0222", "CVE-2014-3640", "CVE-2016-2391", "CVE-2015-7512", "CVE-2015-8550", "CVE-2015-8345", "CVE-2015-8554", "CVE-2015-8568", "CVE-2016-2198", "CVE-2014-7815", "CVE-2013-4534", "CVE-2013-4537", "CVE-2015-8555", "CVE-2015-8744", "CVE-2015-7549", "CVE-2016-2841", "CVE-2015-8743", "CVE-2015-8818", "CVE-2016-1568", "CVE-2013-4539", "CVE-2015-8745", "CVE-2016-1714", "CVE-2016-1981", "CVE-2015-8504", "CVE-2016-2538", "CVE-2016-2271", "CVE-2013-4538", "CVE-2015-5278", "CVE-2016-1571"], "description": "xen was updated to fix 44 security issues.\n\n These security issues were fixed:\n - CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in\n hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or\n possibly execute arbitrary code via a crafted s->rx_level value in a\n savevm image (bsc#864655).\n - CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via vectors related to IRQDest elements (bsc#864811).\n - CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed\n remote attackers to execute arbitrary code via a crafted arglen value in\n a savevm image (bsc#864391).\n - CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in\n hw/display/ssd0323.c allowed remote attackers to cause a denial of\n service (memory corruption) or possibly execute arbitrary code via\n crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and\n row_end values; or (5) col_star and col_end values in a savevm image\n (bsc#864769).\n - CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in\n hw/input/tsc210x.c might have allowed remote attackers to execute\n arbitrary code via a crafted (1) precision, (2) nextprecision, (3)\n function, or (4) nextfunction value in a savevm image (bsc#864805).\n - CVE-2014-0222: Integer overflow in the qcow_open function in\n block/qcow.c allowed remote attackers to cause a denial of service\n (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).\n - CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users\n to cause a denial of service (NULL pointer dereference) by sending a udp\n packet with a value of 0 in the source port and address, which triggers\n access of an uninitialized socket (bsc#897654).\n - CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed\n local guest users to write to qemu memory locations and gain privileges\n via unspecified parameters related to rectangle handling (bsc#901508).\n - CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote\n attackers to cause a denial of service (crash) via a small\n bytes_per_pixel value (bsc#902737).\n - CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE\n functionality had multiple interpretations of a function's return value,\n which allowed guest OS users to cause a host OS denial of service\n (memory consumption or infinite loop, and system crash) via a PRDT with\n zero complete sectors, related to the bmdma_prepare_buf and\n ahci_dma_prepare_buf functions (bsc#928393).\n - CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers\n to cause a denial of service (memory and CPU consumption) via a large\n (1) websocket payload or (2) HTTP headers section (bsc#924018).\n - CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).\n - CVE-2015-6855: hw/ide/core.c did not properly restrict the commands\n accepted by an ATAPI device, which allowed guest users to cause a denial\n of service or possibly have unspecified other impact via certain IDE\n commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty\n drive, which triggers a divide-by-zero error and instance crash\n (bsc#945404).\n - CVE-2015-7512: Buffer overflow in the pcnet_receive function in\n hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote\n attackers to cause a denial of service (guest OS crash) or execute\n arbitrary code via a large packet (bsc#957162).\n - CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).\n - CVE-2015-8345: eepro100: infinite loop in processing command block list\n (bsc#956829).\n - CVE-2015-8504: VNC: floating point exception (bsc#958491).\n - CVE-2015-8550: Paravirtualized drivers were incautious about shared\n memory contents (XSA-155) (bsc#957988).\n - CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164)\n (bsc#958007).\n - CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization\n (XSA-165) (bsc#958009).\n - CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS\n (bsc#959005).\n - CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).\n - CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).\n - CVE-2015-8613: SCSI: stack based buffer overflow in\n megasas_ctrl_get_info (bsc#961358).\n - CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).\n - CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions\n (bsc#960725).\n - CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash\n via assert(2) call (bsc#960835).\n - CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call\n (bsc#960707).\n - CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault\n (I) (bsc#969121).\n - CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault\n (II) (bsc#969122).\n - CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands\n (bsc#961332).\n - CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed\n local PV guests to obtain sensitive information, cause a denial of\n service, gain privileges, or have unspecified other impact via a crafted\n page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2)\n MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3)\n unknown vectors related to page table updates (bsc#960861).\n - CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address\n (XSA-168) (bsc#960862).\n - CVE-2016-1714: nvram: OOB r/w access in processing firmware\n configurations (bsc#961691).\n - CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).\n - CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov\n routines (bsc#963782).\n - CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write\n (bsc#964413).\n - CVE-2016-2270: Xen allowed local guest administrators to cause a denial\n of service (host reboot) via vectors related to multiple mappings of\n MMIO pages with different cachability settings (bsc#965315).\n - CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM\n guest users to cause a denial of service (guest crash) via vectors\n related to a non-canonical RIP (bsc#965317).\n - CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL\n pointer dereference (bsc#967013).\n - CVE-2016-2392: NULL pointer dereference in remote NDIS control message\n handling (bsc#967012).\n - CVE-2016-2538: Integer overflow in remote NDIS control message handling\n (bsc#967969).\n - CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).\n - XSA-166: ioreq handling possibly susceptible to multiple read issue\n (bsc#958523).\n\n These non-security issues were fixed:\n - bsc#954872: script block-dmmd not working as expected\n - bsc#957698: DOM0 can't bring up on Dell PC\n - bsc#963923: domain weights not honored when sched-credit tslice is\n reduced\n - bsc#959332: SLES12SP1 PV guest is unreachable when restored or migrated\n - bsc#959695: Missing docs for xen\n\n", "edition": 1, "modified": "2016-03-24T13:08:24", "published": "2016-03-24T13:08:24", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html", "id": "SUSE-SU-2016:0873-1", "title": "Security update for xen (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:10:59", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8567", "CVE-2016-2392", "CVE-2014-3689", "CVE-2014-9718", "CVE-2016-1570", "CVE-2015-8619", "CVE-2015-8558", "CVE-2013-4527", "CVE-2016-2270", "CVE-2015-6855", "CVE-2015-8613", "CVE-2016-1922", "CVE-2013-4533", "CVE-2015-1779", "CVE-2015-8817", "CVE-2014-0222", "CVE-2014-3640", "CVE-2016-2391", "CVE-2015-7512", "CVE-2015-8550", "CVE-2015-8345", "CVE-2015-8554", "CVE-2015-8568", "CVE-2016-2198", "CVE-2014-7815", "CVE-2013-4534", "CVE-2013-4537", "CVE-2015-8555", "CVE-2015-8744", "CVE-2015-7549", "CVE-2015-8743", "CVE-2015-8818", "CVE-2016-1568", "CVE-2013-4539", "CVE-2015-8745", "CVE-2016-1714", "CVE-2016-1981", "CVE-2015-8504", "CVE-2016-2538", "CVE-2016-2271", "CVE-2013-4530", "CVE-2013-4538", "CVE-2013-4529", "CVE-2015-5278", "CVE-2016-1571"], "description": "xen was updated to fix 46 security issues.\n\n These security issues were fixed:\n - CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed\n remote attackers to execute arbitrary code via vectors related to the\n number of timers (bsc#964746).\n - CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote\n attackers to cause a denial of service and possibly execute arbitrary\n code via a large log_num value in a savevm image (bsc#964929).\n - CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via crafted tx_fifo_head and rx_fifo_head values in a savevm image\n (bsc#964950).\n - CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in\n hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or\n possibly execute arbitrary code via a crafted s->rx_level value in a\n savevm image (bsc#964644).\n - CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via vectors related to IRQDest elements (bsc#964452).\n - CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed\n remote attackers to execute arbitrary code via a crafted arglen value in\n a savevm image (bsc#962642).\n - CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in\n hw/display/ssd0323.c allowed remote attackers to cause a denial of\n service (memory corruption) or possibly execute arbitrary code via\n crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and\n row_end values; or (5) col_star and col_end values in a savevm image\n (bsc#962335).\n - CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in\n hw/input/tsc210x.c might have allowed remote attackers to execute\n arbitrary code via a crafted (1) precision, (2) nextprecision, (3)\n function, or (4) nextfunction value in a savevm image (bsc#962758).\n - CVE-2014-0222: Integer overflow in the qcow_open function in\n block/qcow.c allowed remote attackers to cause a denial of service\n (crash) via a large L2 table in a QCOW version 1 image (bsc#964925).\n - CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users\n to cause a denial of service (NULL pointer dereference) by sending a udp\n packet with a value of 0 in the source port and address, which triggers\n access of an uninitialized socket (bsc#965112).\n - CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed\n local guest users to write to qemu memory locations and gain privileges\n via unspecified parameters related to rectangle handling (bsc#962611).\n - CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote\n attackers to cause a denial of service (crash) via a small\n bytes_per_pixel value (bsc#962627).\n - CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE\n functionality had multiple interpretations of a function's return value,\n which allowed guest OS users to cause a host OS denial of service\n (memory consumption or infinite loop, and system crash) via a PRDT with\n zero complete sectors, related to the bmdma_prepare_buf and\n ahci_dma_prepare_buf functions (bsc#964431).\n - CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers\n to cause a denial of service (memory and CPU consumption) via a large\n (1) websocket payload or (2) HTTP headers section (bsc#962632).\n - CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#964947).\n - CVE-2015-6855: hw/ide/core.c did not properly restrict the commands\n accepted by an ATAPI device, which allowed guest users to cause a denial\n of service or possibly have unspecified other impact via certain IDE\n commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty\n drive, which triggers a divide-by-zero error and instance crash\n (bsc#965156).\n - CVE-2015-7512: Buffer overflow in the pcnet_receive function in\n hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote\n attackers to cause a denial of service (guest OS crash) or execute\n arbitrary code via a large packet (bsc#962360).\n - CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958918).\n - CVE-2015-8345: eepro100: infinite loop in processing command block list\n (bsc#956832).\n - CVE-2015-8504: VNC: floating point exception (bsc#958493).\n - CVE-2015-8550: Paravirtualized drivers were incautious about shared\n memory contents (XSA-155) (bsc#957988).\n - CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164)\n (bsc#958007).\n - CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization\n (XSA-165) (bsc#958009).\n - CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS\n (bsc#959006).\n - CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).\n - CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).\n - CVE-2015-8613: SCSI: stack based buffer overflow in\n megasas_ctrl_get_info (bsc#961358).\n - CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#965269).\n - CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions\n (bsc#960726).\n - CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash\n via assert(2) call (bsc#960836).\n - CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call\n (bsc#960707).\n - CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault\n (I) (bsc#969125).\n - CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault\n (II) (bsc#969126).\n - CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands\n (bsc#961332).\n - CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed\n local PV guests to obtain sensitive information, cause a denial of\n service, gain privileges, or have unspecified other impact via a crafted\n page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2)\n MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3)\n unknown vectors related to page table updates (bsc#960861).\n - CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address\n (XSA-168) (bsc#960862).\n - CVE-2016-1714: nvram: OOB r/w access in processing firmware\n configurations (bsc#961692).\n - CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962321).\n - CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov\n routines (bsc#963783).\n - CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write\n (bsc#964415).\n - CVE-2016-2270: Xen allowed local guest administrators to cause a denial\n of service (host reboot) via vectors related to multiple mappings of\n MMIO pages with different cachability settings (bsc#965315).\n - CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM\n guest users to cause a denial of service (guest crash) via vectors\n related to a non-canonical RIP (bsc#965317).\n - CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL\n pointer dereference (bsc#967101).\n - CVE-2016-2392: NULL pointer dereference in remote NDIS control message\n handling (bsc#967090).\n - CVE-2016-2538: Integer overflow in remote NDIS control message handling\n (bsc#968004).\n - XSA-166: ioreq handling possibly susceptible to multiple read issue\n (bsc#958523).\n\n These non-security issues were fixed:\n - bsc#954872: script block-dmmd not working as expected\n - bsc#963923: domain weights not honored when sched-credit tslice is\n reduced\n - bsc#959695: Missing docs for xen\n\n", "edition": 1, "modified": "2016-05-17T18:07:38", "published": "2016-05-17T18:07:38", "id": "SUSE-SU-2016:1318-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html", "type": "suse", "title": "Security update for xen (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:54:56", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8567", "CVE-2016-2392", "CVE-2014-3689", "CVE-2014-9718", "CVE-2016-1570", "CVE-2015-8619", "CVE-2015-8558", "CVE-2013-4527", "CVE-2016-2270", "CVE-2015-6855", "CVE-2015-8613", "CVE-2016-1922", "CVE-2013-4533", "CVE-2015-1779", "CVE-2015-8817", "CVE-2014-0222", "CVE-2014-3640", "CVE-2016-2391", "CVE-2015-7512", "CVE-2015-8550", "CVE-2015-8345", "CVE-2015-8554", "CVE-2015-8568", "CVE-2016-2198", "CVE-2014-7815", "CVE-2013-4534", "CVE-2013-4537", "CVE-2015-8555", "CVE-2015-8744", "CVE-2015-7549", "CVE-2016-2841", "CVE-2015-8743", "CVE-2015-8818", "CVE-2016-1568", "CVE-2013-4539", "CVE-2015-8745", "CVE-2016-1714", "CVE-2016-1981", "CVE-2015-8504", "CVE-2016-2538", "CVE-2016-2271", "CVE-2013-4530", "CVE-2013-4538", "CVE-2013-4529", "CVE-2015-5278", "CVE-2016-1571"], "description": "xen was updated to fix 47 security issues.\n\n These security issues were fixed:\n - CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed\n remote attackers to execute arbitrary code via vectors related to the\n number of timers (bnc#864673).\n - CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote\n attackers to cause a denial of service and possibly execute arbitrary\n code via a large log_num value in a savevm image (bnc#864678).\n - CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via crafted tx_fifo_head and rx_fifo_head values in a savevm image\n (bnc#864682).\n - CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in\n hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or\n possibly execute arbitrary code via a crafted s->rx_level value in a\n savevm image (bsc#864655).\n - CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote\n attackers to cause a denial of service or possibly execute arbitrary\n code via vectors related to IRQDest elements (bsc#864811).\n - CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed\n remote attackers to execute arbitrary code via a crafted arglen value in\n a savevm image (bsc#864391).\n - CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in\n hw/display/ssd0323.c allowed remote attackers to cause a denial of\n service (memory corruption) or possibly execute arbitrary code via\n crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and\n row_end values; or (5) col_star and col_end values in a savevm image\n (bsc#864769).\n - CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in\n hw/input/tsc210x.c might have allowed remote attackers to execute\n arbitrary code via a crafted (1) precision, (2) nextprecision, (3)\n function, or (4) nextfunction value in a savevm image (bsc#864805).\n - CVE-2014-0222: Integer overflow in the qcow_open function in\n block/qcow.c allowed remote attackers to cause a denial of service\n (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).\n - CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users\n to cause a denial of service (NULL pointer dereference) by sending a udp\n packet with a value of 0 in the source port and address, which triggers\n access of an uninitialized socket (bsc#897654).\n - CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed\n local guest users to write to qemu memory locations and gain privileges\n via unspecified parameters related to rectangle handling (bsc#901508).\n - CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote\n attackers to cause a denial of service (crash) via a small\n bytes_per_pixel value (bsc#902737).\n - CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE\n functionality had multiple interpretations of a function's return value,\n which allowed guest OS users to cause a host OS denial of service\n (memory consumption or infinite loop, and system crash) via a PRDT with\n zero complete sectors, related to the bmdma_prepare_buf and\n ahci_dma_prepare_buf functions (bsc#928393).\n - CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers\n to cause a denial of service (memory and CPU consumption) via a large\n (1) websocket payload or (2) HTTP headers section (bsc#924018).\n - CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).\n - CVE-2015-6855: hw/ide/core.c did not properly restrict the commands\n accepted by an ATAPI device, which allowed guest users to cause a denial\n of service or possibly have unspecified other impact via certain IDE\n commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty\n drive, which triggers a divide-by-zero error and instance crash\n (bsc#945404).\n - CVE-2015-7512: Buffer overflow in the pcnet_receive function in\n hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote\n attackers to cause a denial of service (guest OS crash) or execute\n arbitrary code via a large packet (bsc#957162).\n - CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).\n - CVE-2015-8345: eepro100: infinite loop in processing command block list\n (bsc#956829).\n - CVE-2015-8504: VNC: floating point exception (bsc#958491).\n - CVE-2015-8550: Paravirtualized drivers were incautious about shared\n memory contents (XSA-155) (bsc#957988).\n - CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164)\n (bsc#958007).\n - CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization\n (XSA-165) (bsc#958009).\n - CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS\n (bsc#959005).\n - CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).\n - CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).\n - CVE-2015-8613: SCSI: stack based buffer overflow in\n megasas_ctrl_get_info (bsc#961358).\n - CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).\n - CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions\n (bsc#960725).\n - CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash\n via assert(2) call (bsc#960835).\n - CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call\n (bsc#960707).\n - CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault\n (I) (bsc#969121).\n - CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault\n (II) (bsc#969122).\n - CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands\n (bsc#961332).\n - CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed\n local PV guests to obtain sensitive information, cause a denial of\n service, gain privileges, or have unspecified other impact via a crafted\n page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2)\n MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3)\n unknown vectors related to page table updates (bsc#960861).\n - CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address\n (XSA-168) (bsc#960862).\n - CVE-2016-1714: nvram: OOB r/w access in processing firmware\n configurations (bsc#961691).\n - CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).\n - CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov\n routines (bsc#963782).\n - CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write\n (bsc#964413).\n - CVE-2016-2270: Xen allowed local guest administrators to cause a denial\n of service (host reboot) via vectors related to multiple mappings of\n MMIO pages with different cachability settings (bsc#965315).\n - CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM\n guest users to cause a denial of service (guest crash) via vectors\n related to a non-canonical RIP (bsc#965317).\n - CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL\n pointer dereference (bsc#967013).\n - CVE-2016-2392: NULL pointer dereference in remote NDIS control message\n handling (bsc#967012).\n - CVE-2016-2538: Integer overflow in remote NDIS control message handling\n (bsc#967969).\n - CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).\n - XSA-166: ioreq handling possibly susceptible to multiple read issue\n (bsc#958523).\n\n These non-security issues were fixed:\n - bsc#954872: script block-dmmd not working as expected\n - bsc#963923: domain weights not honored when sched-credit tslice is\n reduced\n - bsc#959695: Missing docs for xen\n - bsc#967630: Discrepancy in reported memory size with correction XSA-153\n for xend\n - bsc#959928: When DomU is in state running xm domstate returned nothing\n\n", "edition": 1, "modified": "2016-04-05T17:08:00", "published": "2016-04-05T17:08:00", "id": "SUSE-SU-2016:0955-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html", "title": "Security update for xen (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compi led for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use. ", "modified": "2015-04-21T18:50:53", "published": "2015-04-21T18:50:53", "id": "FEDORA:D999B601454A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: qemu-2.3.0-0.3.rc2.fc22", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7840", "CVE-2014-8106", "CVE-2015-1779"], "description": "QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compi led for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use. ", "modified": "2015-04-13T07:05:24", "published": "2015-04-13T07:05:24", "id": "FEDORA:EBA7060877F8", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: qemu-2.1.3-5.fc21", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7840", "CVE-2014-8106", "CVE-2015-1779", "CVE-2015-3456"], "description": "QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compi led for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use. ", "modified": "2015-05-17T06:38:09", "published": "2015-05-17T06:38:09", "id": "FEDORA:6D23360762AF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: qemu-2.1.3-7.fc21", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-7840", "CVE-2014-8106", "CVE-2015-1779", "CVE-2015-3456", "CVE-2015-4037"], "description": "QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compi led for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use. ", "modified": "2015-06-21T00:16:05", "published": "2015-06-21T00:16:05", "id": "FEDORA:327666015E56", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: qemu-2.1.3-8.fc21", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-01-01T05:05:52", "description": "Updated qemu-kvm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides\nthe user-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After\ninstalling this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update\nto take effect.", "edition": 29, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-10-28T00:00:00", "title": "RHEL 7 : qemu-kvm (RHSA-2015:1943)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools", "p-cpe:/a:redhat:enterprise_linux:libcacard", "cpe:/o:redhat:enterprise_linux:7.4", "cpe:/o:redhat:enterprise_linux:7.1", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-debuginfo", "cpe:/o:redhat:enterprise_linux:7.5", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:qemu-img", "cpe:/o:redhat:enterprise_linux:7.3", "cpe:/o:redhat:enterprise_linux:7.2", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm", "p-cpe:/a:redhat:enterprise_linux:libcacard-tools", "p-cpe:/a:redhat:enterprise_linux:libcacard-devel"], "id": "REDHAT-RHSA-2015-1943.NASL", "href": "https://www.tenable.com/plugins/nessus/86625", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1943. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86625);\n script_version(\"2.14\");\n script_cvs_date(\"Date: 2019/10/24 15:35:40\");\n\n script_cve_id(\"CVE-2015-1779\");\n script_xref(name:\"RHSA\", value:\"2015:1943\");\n\n script_name(english:\"RHEL 7 : qemu-kvm (RHSA-2015:1943)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated qemu-kvm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides\nthe user-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After\ninstalling this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update\nto take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1943\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1779\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcacard\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcacard-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcacard-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1943\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"libcacard-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcacard-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"libcacard-devel-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcacard-devel-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcacard-tools-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"qemu-kvm-debuginfo-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-debuginfo-1.5.3-86.el7_1.8\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-86.el7_1.8\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libcacard / libcacard-devel / libcacard-tools / qemu-img / qemu-kvm / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T14:19:42", "description": "This update for KVM fixes an issue in the virtio-blk driver which\ncould result in incorrectly setting its WCE configuration. Under some\ncircumstances, this misconfiguration could cause severe file system\ncorruption, because cache flushes were not generated as they ought to\nhave been.\n\nThe update also addresses one security vulnerability :\n\n - Insufficient resource limiting in VNC websockets\n decoder. (bsc#924018). (CVE-2015-1779)", "edition": 23, "published": "2015-05-14T00:00:00", "title": "SuSE 11.3 Security Update : kvm (SAT Patch Number 10645)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2015-05-14T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:kvm", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_11_KVM-150428.NASL", "href": "https://www.tenable.com/plugins/nessus/83462", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83462);\n script_version(\"2.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-1779\");\n\n script_name(english:\"SuSE 11.3 Security Update : kvm (SAT Patch Number 10645)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for KVM fixes an issue in the virtio-blk driver which\ncould result in incorrectly setting its WCE configuration. Under some\ncircumstances, this misconfiguration could cause severe file system\ncorruption, because cache flushes were not generated as they ought to\nhave been.\n\nThe update also addresses one security vulnerability :\n\n - Insufficient resource limiting in VNC websockets\n decoder. (bsc#924018). (CVE-2015-1779)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=920571\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=924018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-1779.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 10645.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, \"SuSE 11.3\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"kvm-1.4.2-0.22.25.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"kvm-1.4.2-0.22.25.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:3, reference:\"kvm-1.4.2-0.22.25.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-01T05:05:52", "description": "Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Virtualization Hypervisor 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package\nprovides the user-space component for running virtual machines using\nKVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, shut down all running virtual machines.\nOnce all virtual machines have shut down, start them again for this\nupdate to take effect.", "edition": 21, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2018-09-06T00:00:00", "title": "RHEL 7 : qemu-kvm-rhev (RHSA-2015:1931)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:libcacard-devel-rhev", "p-cpe:/a:redhat:enterprise_linux:libcacard-tools-rhev", "p-cpe:/a:redhat:enterprise_linux:libcacard-rhev", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools-rhev", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common-rhev", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:qemu-img-rhev", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-rhev-debuginfo", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-rhev"], "id": "REDHAT-RHSA-2015-1931.NASL", "href": "https://www.tenable.com/plugins/nessus/117309", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1931. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(117309);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/10/24 15:35:40\");\n\n script_cve_id(\"CVE-2015-1779\");\n script_xref(name:\"RHSA\", value:\"2015:1931\");\n\n script_name(english:\"RHEL 7 : qemu-kvm-rhev (RHSA-2015:1931)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated qemu-kvm-rhev packages that fix one security issue are now\navailable for Red Hat Enterprise Virtualization Hypervisor 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package\nprovides the user-space component for running virtual machines using\nKVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, shut down all running virtual machines.\nOnce all virtual machines have shut down, start them again for this\nupdate to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1931\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1779\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcacard-devel-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcacard-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcacard-tools-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-img-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-rhev-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools-rhev\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/09/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1931\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcacard-devel-rhev-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcacard-rhev-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcacard-tools-rhev-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-img-rhev-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-rhev-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-rhev-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.10\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-rhev-2.1.2-23.el7_1.10\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libcacard-devel-rhev / libcacard-rhev / libcacard-tools-rhev / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:49:00", "description": "It was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nAfter installing this update, shut down all running virtual machines.\nOnce all virtual machines have shut down, start them again for this\nupdate to take effect.", "edition": 16, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-10-28T00:00:00", "title": "Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20151027)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2015-10-28T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:qemu-img", "p-cpe:/a:fermilab:scientific_linux:libcacard-tools", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm-common", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm", "p-cpe:/a:fermilab:scientific_linux:libcacard", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm-tools", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm-debuginfo", "p-cpe:/a:fermilab:scientific_linux:libcacard-devel"], "id": "SL_20151027_QEMU_KVM_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/86626", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86626);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2015-1779\");\n\n script_name(english:\"Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20151027)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nAfter installing this update, shut down all running virtual machines.\nOnce all virtual machines have shut down, start them again for this\nupdate to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1510&L=scientific-linux-errata&F=&S=&P=6479\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?de199472\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libcacard\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libcacard-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libcacard-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 7.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"libcacard-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"libcacard-devel-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"libcacard-tools-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-debuginfo-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-86.el7_1.8\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libcacard / libcacard-devel / libcacard-tools / qemu-img / qemu-kvm / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:13:39", "description": " - Rebased to version 2.3.0-rc2\n\n - Don't install ksm services as executable (bz #1192720)\n\n - Skip hanging tests on s390 (bz #1206057)\n\n - CVE-2015-1779 vnc: insufficient resource limiting in\n VNC websockets decoder (bz #1205051, bz #1199572)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 19, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-04-22T00:00:00", "title": "Fedora 22 : qemu-2.3.0-0.3.rc2.fc22 (2015-5541)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2015-04-22T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qemu", "cpe:/o:fedoraproject:fedora:22"], "id": "FEDORA_2015-5541.NASL", "href": "https://www.tenable.com/plugins/nessus/82963", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-5541.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82963);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1779\");\n script_xref(name:\"FEDORA\", value:\"2015-5541\");\n\n script_name(english:\"Fedora 22 : qemu-2.3.0-0.3.rc2.fc22 (2015-5541)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Rebased to version 2.3.0-rc2\n\n - Don't install ksm services as executable (bz #1192720)\n\n - Skip hanging tests on s390 (bz #1206057)\n\n - CVE-2015-1779 vnc: insufficient resource limiting in\n VNC websockets decoder (bz #1205051, bz #1199572)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1199572\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d9186029\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qemu package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"qemu-2.3.0-0.3.rc2.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T11:51:49", "description": "Updated qemu packages fix security vulnerabilities :\n\nA denial of service flaw was found in the way QEMU handled malformed\nPhysical Region Descriptor Table (PRDT) data sent to the host's IDE\nand/or AHCI controller emulation. A privileged guest user could use\nthis flaw to crash the system (rhbz#1204919).\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU (CVE-2015-1779).", "edition": 25, "published": "2015-04-28T00:00:00", "title": "Mandriva Linux Security Advisory : qemu (MDVSA-2015:210)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2015-04-28T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:qemu", "cpe:/o:mandriva:business_server:2", "p-cpe:/a:mandriva:linux:qemu-img"], "id": "MANDRIVA_MDVSA-2015-210.NASL", "href": "https://www.tenable.com/plugins/nessus/83102", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2015:210. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83102);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2015-1779\");\n script_xref(name:\"MDVSA\", value:\"2015:210\");\n\n script_name(english:\"Mandriva Linux Security Advisory : qemu (MDVSA-2015:210)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated qemu packages fix security vulnerabilities :\n\nA denial of service flaw was found in the way QEMU handled malformed\nPhysical Region Descriptor Table (PRDT) data sent to the host's IDE\nand/or AHCI controller emulation. A privileged guest user could use\nthis flaw to crash the system (rhbz#1204919).\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU (CVE-2015-1779).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2015-0149.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qemu and / or qemu-img packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"qemu-1.6.2-1.3.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"qemu-img-1.6.2-1.3.mbs1\")) flag++;\n\nif (rpm_check(release:\"MDK-MBS2\", cpu:\"x86_64\", reference:\"qemu-1.6.2-1.1.mbs2\")) flag++;\nif (rpm_check(release:\"MDK-MBS2\", cpu:\"x86_64\", reference:\"qemu-img-1.6.2-1.1.mbs2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:30:22", "description": "Updated qemu-kvm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides\nthe user-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After\ninstalling this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update\nto take effect.", "edition": 30, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-10-29T00:00:00", "title": "CentOS 7 : qemu-kvm (CESA-2015:1943)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2015-10-29T00:00:00", "cpe": ["cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:qemu-kvm", "p-cpe:/a:centos:centos:libcacard-devel", "p-cpe:/a:centos:centos:qemu-kvm-common", "p-cpe:/a:centos:centos:libcacard-tools", "p-cpe:/a:centos:centos:qemu-img", "p-cpe:/a:centos:centos:qemu-kvm-tools", "p-cpe:/a:centos:centos:libcacard"], "id": "CENTOS_RHSA-2015-1943.NASL", "href": "https://www.tenable.com/plugins/nessus/86639", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1943 and \n# CentOS Errata and Security Advisory 2015:1943 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86639);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2015-1779\");\n script_xref(name:\"RHSA\", value:\"2015:1943\");\n\n script_name(english:\"CentOS 7 : qemu-kvm (CESA-2015:1943)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated qemu-kvm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides\nthe user-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After\ninstalling this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update\nto take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2015-October/021449.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?63bfccb4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qemu-kvm packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1779\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libcacard\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libcacard-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libcacard-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"libcacard-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"libcacard-devel-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"libcacard-tools-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-86.el7_1.8\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libcacard / libcacard-devel / libcacard-tools / qemu-img / qemu-kvm / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:50:12", "description": "From Red Hat Security Advisory 2015:1943 :\n\nUpdated qemu-kvm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides\nthe user-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After\ninstalling this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update\nto take effect.", "edition": 27, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-10-28T00:00:00", "title": "Oracle Linux 7 : qemu-kvm (ELSA-2015-1943)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "modified": "2015-10-28T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:qemu-kvm-tools", "p-cpe:/a:oracle:linux:libcacard-devel", "p-cpe:/a:oracle:linux:libcacard", "p-cpe:/a:oracle:linux:qemu-kvm-common", "p-cpe:/a:oracle:linux:qemu-img", "p-cpe:/a:oracle:linux:libcacard-tools", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:qemu-kvm"], "id": "ORACLELINUX_ELSA-2015-1943.NASL", "href": "https://www.tenable.com/plugins/nessus/86624", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2015:1943 and \n# Oracle Linux Security Advisory ELSA-2015-1943 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86624);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2015-1779\");\n script_xref(name:\"RHSA\", value:\"2015:1943\");\n\n script_name(english:\"Oracle Linux 7 : qemu-kvm (ELSA-2015-1943)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2015:1943 :\n\nUpdated qemu-kvm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides\nthe user-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed\nincoming frames without limiting resources used to process the header\nand the payload. An attacker able to access a guest's VNC console\ncould use this flaw to trigger a denial of service on the host by\nexhausting all available memory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After\ninstalling this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update\nto take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2015-October/005475.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qemu-kvm packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libcacard\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libcacard-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libcacard-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libcacard-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libcacard-devel-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libcacard-tools-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-86.el7_1.8\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-86.el7_1.8\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libcacard / libcacard-devel / libcacard-tools / qemu-img / qemu-kvm / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:13:39", "description": " - CVE-2015-1779 vnc: insufficient resource limiting in VNC\n websockets decoder (bz #1205051, bz #1199572)\n\n - Qemu: PRDT overflow from guest to host (bz #1204919,\n bz #1205322)\n\n - CVE-2014-8106: cirrus: insufficient blit region checks\n (bz #1170612, bz #1169454)\n\n - Fix .vdi disk corruption (bz #1199400)\n\n - Don't install ksm services as executable (bz #1192720)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 19, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-04-14T00:00:00", "title": "Fedora 21 : qemu-2.1.3-5.fc21 (2015-5482)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-8106", "CVE-2015-1779"], "modified": "2015-04-14T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qemu", "cpe:/o:fedoraproject:fedora:21"], "id": "FEDORA_2015-5482.NASL", "href": "https://www.tenable.com/plugins/nessus/82751", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-5482.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82751);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-8106\", \"CVE-2015-1779\");\n script_xref(name:\"FEDORA\", value:\"2015-5482\");\n\n script_name(english:\"Fedora 21 : qemu-2.1.3-5.fc21 (2015-5482)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - CVE-2015-1779 vnc: insufficient resource limiting in VNC\n websockets decoder (bz #1205051, bz #1199572)\n\n - Qemu: PRDT overflow from guest to host (bz #1204919,\n bz #1205322)\n\n - CVE-2014-8106: cirrus: insufficient blit region checks\n (bz #1170612, bz #1169454)\n\n - Fix .vdi disk corruption (bz #1199400)\n\n - Don't install ksm services as executable (bz #1192720)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1169454\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1199572\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1204919\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fe984418\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qemu package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:21\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^21([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 21.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC21\", reference:\"qemu-2.1.3-5.fc21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-20T15:28:52", "description": "Jason Geffner discovered that QEMU incorrectly handled the virtual\nfloppy driver. This issue is known as VENOM. A malicious guest could\nuse this issue to cause a denial of service, or possibly execute\narbitrary code on the host as the user running the QEMU process. In\nthe default installation, when QEMU is used with libvirt, attackers\nwould be isolated by the libvirt AppArmor profile. (CVE-2015-3456)\n\nDaniel P. Berrange discovered that QEMU incorrectly handled VNC\nwebsockets. A remote attacker could use this issue to cause QEMU to\nconsume memory, resulting in a denial of service. This issue only\naffected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04.\n(CVE-2015-1779)\n\nJan Beulich discovered that QEMU, when used with Xen, didn't properly\nrestrict access to PCI command registers. A malicious guest could use\nthis issue to cause a denial of service. This issue only affected\nUbuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-2756).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "cvss3": {"score": 8.6, "vector": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2015-05-13T00:00:00", "title": "Ubuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : qemu, qemu-kvm vulnerabilities (USN-2608-1) (Venom)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "modified": "2015-05-13T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:15.04", "p-cpe:/a:canonical:ubuntu_linux:qemu-system", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-aarch64", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-x86", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-ppc", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-sparc", "cpe:/o:canonical:ubuntu_linux:14.10", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-arm", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-mips", "p-cpe:/a:canonical:ubuntu_linux:qemu-system-misc", "p-cpe:/a:canonical:ubuntu_linux:qemu-kvm", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2608-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83435", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2608-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83435);\n script_version(\"2.30\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1779\", \"CVE-2015-2756\", \"CVE-2015-3456\");\n script_bugtraq_id(72577, 73303);\n script_xref(name:\"USN\", value:\"2608-1\");\n script_xref(name:\"IAVA\", value:\"2015-A-0115\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : qemu, qemu-kvm vulnerabilities (USN-2608-1) (Venom)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jason Geffner discovered that QEMU incorrectly handled the virtual\nfloppy driver. This issue is known as VENOM. A malicious guest could\nuse this issue to cause a denial of service, or possibly execute\narbitrary code on the host as the user running the QEMU process. In\nthe default installation, when QEMU is used with libvirt, attackers\nwould be isolated by the libvirt AppArmor profile. (CVE-2015-3456)\n\nDaniel P. Berrange discovered that QEMU incorrectly handled VNC\nwebsockets. A remote attacker could use this issue to cause QEMU to\nconsume memory, resulting in a denial of service. This issue only\naffected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04.\n(CVE-2015-1779)\n\nJan Beulich discovered that QEMU, when used with Xen, didn't properly\nrestrict access to PCI command registers. A malicious guest could use\nthis issue to cause a denial of service. This issue only affected\nUbuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-2756).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2608-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-aarch64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-arm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-mips\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-misc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-ppc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-sparc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qemu-system-x86\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|14\\.04|14\\.10|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 14.04 / 14.10 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"qemu-kvm\", pkgver:\"1.0+noroms-0ubuntu14.22\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-aarch64\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-arm\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-mips\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-misc\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-ppc\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-sparc\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"qemu-system-x86\", pkgver:\"2.0.0+dfsg-2ubuntu1.11\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-aarch64\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-arm\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-mips\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-misc\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-ppc\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-sparc\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"qemu-system-x86\", pkgver:\"2.1+dfsg-4ubuntu6.6\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-aarch64\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-arm\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-mips\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-misc\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-ppc\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-sparc\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"qemu-system-x86\", pkgver:\"1:2.2+dfsg-5expubuntu9.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu-kvm / qemu-system / qemu-system-aarch64 / qemu-system-arm / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:58", "bulletinFamily": "software", "cvelist": ["CVE-2015-1779"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2015:210\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : qemu\r\n Date : April 27, 2015\r\n Affected: Business Server 1.0, Business Server 2.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Updated qemu packages fix security vulnerabilities:\r\n \r\n A denial of service flaw was found in the way QEMU handled malformed\r\n Physical Region Descriptor Table (PRDT) data sent to the host's IDE\r\n and/or AHCI controller emulation. A privileged guest user could use\r\n this flaw to crash the system (rhbz#1204919).\r\n \r\n It was found that the QEMU's websocket frame decoder processed incoming\r\n frames without limiting resources used to process the header and the\r\n payload. An attacker able to access a guest's VNC console could use\r\n this flaw to trigger a denial of service on the host by exhausting\r\n all available memory and CPU (CVE-2015-1779).\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779\r\n http://advisories.mageia.org/MGASA-2015-0149.html\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n bc2beef4372b8b5e6f304b43ea03932e mbs1/x86_64/qemu-1.6.2-1.3.mbs1.x86_64.rpm\r\n 66b90d7aa493a9d5a4f211348fc3f11e mbs1/x86_64/qemu-img-1.6.2-1.3.mbs1.x86_64.rpm \r\n 963f9b67a4f17912f78a2f836eff5779 mbs1/SRPMS/qemu-1.6.2-1.3.mbs1.src.rpm\r\n\r\n Mandriva Business Server 2/X86_64:\r\n 50ec69a06c81554133e2b6498f80aadd mbs2/x86_64/qemu-1.6.2-1.1.mbs2.x86_64.rpm\r\n 3614812ed41087f722183a335dcf1085 mbs2/x86_64/qemu-img-1.6.2-1.1.mbs2.x86_64.rpm \r\n 59781eb204137b664c40b646638259f9 mbs2/SRPMS/qemu-1.6.2-1.1.mbs2.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFVPf9DmqjQ0CJFipgRAhTUAJ0YpEHATH84jxU6Eu/S1p6cxxlZ5QCggdwE\r\n8O51hL6WbyTUwpWcAFXxssQ=\r\n=C7sG\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2015-05-05T00:00:00", "published": "2015-05-05T00:00:00", "id": "SECURITYVULNS:DOC:31996", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31996", "title": "[ MDVSA-2015:210 ] qemu", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:59", "bulletinFamily": "software", "cvelist": ["CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2608-1\r\nMay 13, 2015\r\n\r\nqemu, qemu-kvm vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.04\r\n- Ubuntu 14.10\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in QEMU.\r\n\r\nSoftware Description:\r\n- qemu: Machine emulator and virtualizer\r\n- qemu-kvm: Machine emulator and virtualizer\r\n\r\nDetails:\r\n\r\nJason Geffner discovered that QEMU incorrectly handled the virtual floppy\r\ndriver. This issue is known as VENOM. A malicious guest could use this\r\nissue to cause a denial of service, or possibly execute arbitrary code on\r\nthe host as the user running the QEMU process. In the default installation,\r\nwhen QEMU is used with libvirt, attackers would be isolated by the libvirt\r\nAppArmor profile. (CVE-2015-3456)\r\n\r\nDaniel P. Berrange discovered that QEMU incorrectly handled VNC websockets.\r\nA remote attacker could use this issue to cause QEMU to consume memory,\r\nresulting in a denial of service. This issue only affected Ubuntu 14.04\r\nLTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779)\r\n\r\nJan Beulich discovered that QEMU, when used with Xen, didn't properly\r\nrestrict access to PCI command registers. A malicious guest could use this\r\nissue to cause a denial of service. This issue only affected Ubuntu 14.04\r\nLTS and Ubuntu 14.10. (CVE-2015-2756)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.04:\r\n qemu-system 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-aarch64 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-arm 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-mips 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-misc 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-ppc 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-sparc 1:2.2+dfsg-5expubuntu9.1\r\n qemu-system-x86 1:2.2+dfsg-5expubuntu9.1\r\n\r\nUbuntu 14.10:\r\n qemu-system 2.1+dfsg-4ubuntu6.6\r\n qemu-system-aarch64 2.1+dfsg-4ubuntu6.6\r\n qemu-system-arm 2.1+dfsg-4ubuntu6.6\r\n qemu-system-mips 2.1+dfsg-4ubuntu6.6\r\n qemu-system-misc 2.1+dfsg-4ubuntu6.6\r\n qemu-system-ppc 2.1+dfsg-4ubuntu6.6\r\n qemu-system-sparc 2.1+dfsg-4ubuntu6.6\r\n qemu-system-x86 2.1+dfsg-4ubuntu6.6\r\n\r\nUbuntu 14.04 LTS:\r\n qemu-system 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-arm 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-mips 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-misc 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-ppc 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-sparc 2.0.0+dfsg-2ubuntu1.11\r\n qemu-system-x86 2.0.0+dfsg-2ubuntu1.11\r\n\r\nUbuntu 12.04 LTS:\r\n qemu-kvm 1.0+noroms-0ubuntu14.22\r\n\r\nAfter a standard system update you need to restart all QEMU virtual\r\nmachines to make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2608-1\r\n CVE-2015-1779, CVE-2015-2756, CVE-2015-3456\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/qemu/1:2.2+dfsg-5expubuntu9.1\r\n https://launchpad.net/ubuntu/+source/qemu/2.1+dfsg-4ubuntu6.6\r\n https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.11\r\n https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.22\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-05-17T00:00:00", "published": "2015-05-17T00:00:00", "id": "SECURITYVULNS:DOC:32124", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32124", "title": "[USN-2608-1] QEMU vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:00", "bulletinFamily": "software", "cvelist": ["CVE-2014-9718", "CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "description": "Crash on PCI registers, IDE controller and Physical Region Descriptor Table decoder. Code execution.", "edition": 1, "modified": "2015-05-17T00:00:00", "published": "2015-05-17T00:00:00", "id": "SECURITYVULNS:VULN:14442", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14442", "title": "libvirt / qemu security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "centos": [{"lastseen": "2019-12-20T18:25:40", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "**CentOS Errata and Security Advisory** CESA-2015:1943\n\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed incoming\nframes without limiting resources used to process the header and the\npayload. An attacker able to access a guest's VNC console could use this\nflaw to trigger a denial of service on the host by exhausting all available\nmemory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-October/033487.html\n\n**Affected packages:**\nlibcacard\nlibcacard-devel\nlibcacard-tools\nqemu-img\nqemu-kvm\nqemu-kvm-common\nqemu-kvm-tools\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-1943.html", "edition": 3, "modified": "2015-10-28T09:28:27", "published": "2015-10-28T09:28:27", "href": "http://lists.centos.org/pipermail/centos-announce/2015-October/033487.html", "id": "CESA-2015:1943", "title": "libcacard, qemu security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:36:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2015-10-28T00:00:00", "id": "OPENVAS:1361412562310871466", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871466", "type": "openvas", "title": "RedHat Update for qemu-kvm RHSA-2015:1943-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for qemu-kvm RHSA-2015:1943-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871466\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-28 07:17:35 +0100 (Wed, 28 Oct 2015)\");\n script_cve_id(\"CVE-2015-1779\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"RedHat Update for qemu-kvm RHSA-2015:1943-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu-kvm'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed incoming\nframes without limiting resources used to process the header and the\npayload. An attacker able to access a guest's VNC console could use this\nflaw to trigger a denial of service on the host by exhausting all available\nmemory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.\");\n script_tag(name:\"affected\", value:\"qemu-kvm on Red Hat Enterprise Linux Server (v. 7)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"RHSA\", value:\"2015:1943-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2015-October/msg00039.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_7\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"libcacard\", rpm:\"libcacard~1.5.3~86.el7_1.8\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-img\", rpm:\"qemu-img~1.5.3~86.el7_1.8\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~1.5.3~86.el7_1.8\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-common\", rpm:\"qemu-kvm-common~1.5.3~86.el7_1.8\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-debuginfo\", rpm:\"qemu-kvm-debuginfo~1.5.3~86.el7_1.8\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-tools\", rpm:\"qemu-kvm-tools~1.5.3~86.el7_1.8\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-07-07T00:00:00", "id": "OPENVAS:1361412562310869552", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869552", "type": "openvas", "title": "Fedora Update for qemu FEDORA-2015-5541", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for qemu FEDORA-2015-5541\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869552\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-07-07 06:24:50 +0200 (Tue, 07 Jul 2015)\");\n script_cve_id(\"CVE-2015-1779\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qemu FEDORA-2015-5541\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qemu on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-5541\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"qemu\", rpm:\"qemu~2.3.0~0.3.rc2.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "description": "Check the version of libcacard", "modified": "2019-03-08T00:00:00", "published": "2015-10-29T00:00:00", "id": "OPENVAS:1361412562310882309", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882309", "type": "openvas", "title": "CentOS Update for libcacard CESA-2015:1943 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for libcacard CESA-2015:1943 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882309\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-29 05:55:03 +0100 (Thu, 29 Oct 2015)\");\n script_cve_id(\"CVE-2015-1779\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for libcacard CESA-2015:1943 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of libcacard\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed incoming\nframes without limiting resources used to process the header and the\npayload. An attacker able to access a guest's VNC console could use this\nflaw to trigger a denial of service on the host by exhausting all available\nmemory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.\");\n script_tag(name:\"affected\", value:\"libcacard on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_xref(name:\"CESA\", value:\"2015:1943\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2015-October/021449.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"libcacard\", rpm:\"libcacard~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libcacard-devel\", rpm:\"libcacard-devel~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libcacard-tools\", rpm:\"libcacard-tools~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-img\", rpm:\"qemu-img~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-common\", rpm:\"qemu-kvm-common~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-tools\", rpm:\"qemu-kvm-tools~1.5.3~86.el7_1.8\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-31T18:36:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2015-10-13T00:00:00", "id": "OPENVAS:1361412562310850774", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850774", "type": "openvas", "title": "SUSE: Security Advisory for kvm (SUSE-SU-2015:0870-1)", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850774\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-13 15:24:58 +0530 (Tue, 13 Oct 2015)\");\n script_cve_id(\"CVE-2015-1779\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for kvm (SUSE-SU-2015:0870-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kvm'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for KVM fixes an issue in the virtio-blk driver which could\n result in incorrectly setting its WCE configuration. Under some\n circumstances, this misconfiguration could cause severe file system\n corruption, because cache flushes were not generated as they ought to have\n been.\n\n The update also addresses one security vulnerability:\n\n * CVE-2015-1779: Insufficient resource limiting in VNC websockets\n decoder. (bsc#924018)\");\n\n script_tag(name:\"affected\", value:\"kvm on SUSE Linux Enterprise Server 11 SP3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2015:0870-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=SLES11\\.0SP3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLES11.0SP3\") {\n if(!isnull(res = isrpmvuln(pkg:\"kvm\", rpm:\"kvm~1.4.2~0.22.25.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779"], "description": "Oracle Linux Local Security Checks ELSA-2015-1943", "modified": "2018-09-28T00:00:00", "published": "2015-11-08T00:00:00", "id": "OPENVAS:1361412562310122730", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122730", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2015-1943", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2015-1943.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122730\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-11-08 13:05:20 +0200 (Sun, 08 Nov 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2015-1943\");\n script_tag(name:\"insight\", value:\"ELSA-2015-1943 - qemu-kvm security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2015-1943\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2015-1943.html\");\n script_cve_id(\"CVE-2015-1779\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"libcacard\", rpm:\"libcacard~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libcacard-devel\", rpm:\"libcacard-devel~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libcacard-tools\", rpm:\"libcacard-tools~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qemu-img\", rpm:\"qemu-img~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qemu-kvm-common\", rpm:\"qemu-kvm-common~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qemu-kvm-tools\", rpm:\"qemu-kvm-tools~1.5.3~86.el7_1.8\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-03-14T19:00:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779", "CVE-2015-3456"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310850916", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850916", "type": "openvas", "title": "SUSE: Security Advisory for qemu (SUSE-SU-2015:0896-1)", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850916\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 14:14:58 +0200 (Fri, 16 Oct 2015)\");\n script_cve_id(\"CVE-2015-1779\", \"CVE-2015-3456\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for qemu (SUSE-SU-2015:0896-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"qemu / kvm was updated to fix a security issue and some bugs.\n\n Security issue fixed:\n\n * CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,\n which could be used to denial of service attacks or potential code\n execution against the host.\n\n * CVE-2015-1779: Fixed insufficient resource limiting in the VNC\n websockets decoder.\n\n\n Bugs fixed:\n\n - qemu truncates vhd images in virt-rescue (bsc#886378)\n\n - Update kvm-supported.txt with the current rbd support status.\n\n - enable rbd build on x86_64 (qemu-block-rbd package) (FATE#318349)\");\n\n script_tag(name:\"affected\", value:\"qemu on SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Desktop 12\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2015:0896-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(SLED12\\.0SP0|SLES12\\.0SP0)\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLED12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"qemu\", rpm:\"qemu~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-curl\", rpm:\"qemu-block-curl~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-curl-debuginfo\", rpm:\"qemu-block-curl-debuginfo~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-debugsource\", rpm:\"qemu-debugsource~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-tools\", rpm:\"qemu-tools~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-tools-debuginfo\", rpm:\"qemu-tools-debuginfo~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-x86\", rpm:\"qemu-x86~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-x86-debuginfo\", rpm:\"qemu-x86-debuginfo~2.0.2~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ipxe\", rpm:\"qemu-ipxe~1.0.0~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-seabios\", rpm:\"qemu-seabios~1.7.4~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-sgabios\", rpm:\"qemu-sgabios~8~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-vgabios\", rpm:\"qemu-vgabios~1.7.4~46.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"SLES12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"qemu\", rpm:\"qemu~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-curl\", rpm:\"qemu-block-curl~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-curl-debuginfo\", rpm:\"qemu-block-curl-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-debugsource\", rpm:\"qemu-debugsource~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-guest-agent\", rpm:\"qemu-guest-agent~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-guest-agent-debuginfo\", rpm:\"qemu-guest-agent-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-lang\", rpm:\"qemu-lang~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-tools\", rpm:\"qemu-tools~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-tools-debuginfo\", rpm:\"qemu-tools-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ppc\", rpm:\"qemu-ppc~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ppc-debuginfo\", rpm:\"qemu-ppc-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ipxe\", rpm:\"qemu-ipxe~1.0.0~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-seabios\", rpm:\"qemu-seabios~1.7.4~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-sgabios\", rpm:\"qemu-sgabios~8~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-vgabios\", rpm:\"qemu-vgabios~1.7.4~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-rbd\", rpm:\"qemu-block-rbd~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-rbd-debuginfo\", rpm:\"qemu-block-rbd-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-x86\", rpm:\"qemu-x86~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-x86-debuginfo\", rpm:\"qemu-x86-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-s390\", rpm:\"qemu-s390~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-s390-debuginfo\", rpm:\"qemu-s390-debuginfo~2.0.2~46.1\", rls:\"SLES12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2015-06-09T00:00:00", "id": "OPENVAS:1361412562310842220", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842220", "type": "openvas", "title": "Ubuntu Update for qemu USN-2608-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for qemu USN-2608-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842220\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-06-09 11:08:26 +0200 (Tue, 09 Jun 2015)\");\n script_cve_id(\"CVE-2015-3456\", \"CVE-2015-1779\", \"CVE-2015-2756\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for qemu USN-2608-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Jason Geffner discovered that QEMU\nincorrectly handled the virtual floppy driver. This issue is known as VENOM.\nA malicious guest could use this issue to cause a denial of service, or possibly\nexecute arbitrary code on the host as the user running the QEMU process. In the\ndefault installation, when QEMU is used with libvirt, attackers would be isolated\nby the libvirt AppArmor profile. (CVE-2015-3456)\n\nDaniel P. Berrange discovered that QEMU incorrectly handled VNC websockets.\nA remote attacker could use this issue to cause QEMU to consume memory,\nresulting in a denial of service. This issue only affected Ubuntu 14.04\nLTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779)\n\nJan Beulich discovered that QEMU, when used with Xen, didn't properly\nrestrict access to PCI command registers. A malicious guest could use this\nissue to cause a denial of service. This issue only affected Ubuntu 14.04\nLTS and Ubuntu 14.10. (CVE-2015-2756)\");\n script_tag(name:\"affected\", value:\"qemu on Ubuntu 14.10,\n Ubuntu 14.04 LTS,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2608-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2608-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.10|14\\.04 LTS|12\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu-system\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-aarch64\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-arm\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-mips\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-misc\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-ppc\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-sparc\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-x86\", ver:\"2.1+dfsg-4ubuntu6.6\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu-system\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-aarch64\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-arm\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-mips\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-misc\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-ppc\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-sparc\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-x86\", ver:\"2.0.0+dfsg-2ubuntu1.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu-kvm\", ver:\"1.0+noroms-0ubuntu14.22\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-8106", "CVE-2015-1779", "CVE-2014-7840"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-04-14T00:00:00", "id": "OPENVAS:1361412562310869238", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869238", "type": "openvas", "title": "Fedora Update for qemu FEDORA-2015-5482", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for qemu FEDORA-2015-5482\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869238\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-04-14 07:16:44 +0200 (Tue, 14 Apr 2015)\");\n script_cve_id(\"CVE-2015-1779\", \"CVE-2014-8106\", \"CVE-2014-7840\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qemu FEDORA-2015-5482\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qemu on Fedora 21\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-5482\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC21\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC21\")\n{\n\n if ((res = isrpmvuln(pkg:\"qemu\", rpm:\"qemu~2.1.3~5.fc21\", rls:\"FC21\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-07-24T12:54:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-9718", "CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "description": "Several vulnerabilities were discovered\nin the qemu virtualisation solution:\n\nCVE-2014-9718\nIt was discovered that the IDE controller emulation is susceptible\nto denial of service.\n\nCVE-2015-1779\nDaniel P. Berrange discovered a denial of service vulnerability in\nthe VNC web socket decoder.\n\nCVE-2015-2756\nJan Beulich discovered that unmediated PCI command register could\nresult in denial of service.\n\nCVE-2015-3456\nJason Geffner discovered a buffer overflow in the emulated floppy\ndisk drive, resulting in the potential execution of arbitrary code.", "modified": "2017-07-07T00:00:00", "published": "2015-05-13T00:00:00", "id": "OPENVAS:703259", "href": "http://plugins.openvas.org/nasl.php?oid=703259", "type": "openvas", "title": "Debian Security Advisory DSA 3259-1 (qemu - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3259.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3259-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703259);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2014-9718\", \"CVE-2015-1779\", \"CVE-2015-2756\", \"CVE-2015-3456\");\n script_name(\"Debian Security Advisory DSA 3259-1 (qemu - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-05-13 00:00:00 +0200 (Wed, 13 May 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3259.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"qemu on Debian Linux\");\n script_tag(name: \"insight\", value: \"QEMU is a fast processor emulator:\ncurrently the package supports ARM, CRIS, i386, M68k (ColdFire), MicroBlaze,\nMIPS, PowerPC, SH4, SPARC and x86-64 emulation. By using dynamic translation\nit achieves reasonable speed while being easy to port on new host CPUs. QEMU\nhas two operating modes:\");\n script_tag(name: \"solution\", value: \"For the oldstable distribution (wheezy),\nthese problems have been fixed in version 1.1.2+dfsg-6a+deb7u7 of the qemu source\npackage and in version 1.1.2+dfsg-6+deb7u7 of the qemu-kvm source package. Only\nCVE-2015-3456 affects oldstable.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:2.1+dfsg-12.\n\nFor the unstable distribution (sid), these problems will be fixed soon.\n\nWe recommend that you upgrade your qemu packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities were discovered\nin the qemu virtualisation solution:\n\nCVE-2014-9718\nIt was discovered that the IDE controller emulation is susceptible\nto denial of service.\n\nCVE-2015-1779\nDaniel P. Berrange discovered a denial of service vulnerability in\nthe VNC web socket decoder.\n\nCVE-2015-2756\nJan Beulich discovered that unmediated PCI command register could\nresult in denial of service.\n\nCVE-2015-3456\nJason Geffner discovered a buffer overflow in the emulated floppy\ndisk drive, resulting in the potential execution of arbitrary code.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kvm\", ver:\"1.1.2+dfsg-6+deb7u7\", rls_regex:\"DEB7.[0-9]\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qemu-kvm\", ver:\"1.1.2+dfsg-6+deb7u7\", rls_regex:\"DEB7.[0-9]\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qemu-kvm-dbg\", ver:\"1.1.2+dfsg-6+deb7u7\", rls_regex:\"DEB7.[0-9]\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-8106", "CVE-2015-1779", "CVE-2015-3456", "CVE-2014-7840"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-06-09T00:00:00", "id": "OPENVAS:1361412562310869363", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310869363", "type": "openvas", "title": "Fedora Update for qemu FEDORA-2015-8249", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for qemu FEDORA-2015-8249\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.869363\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-06-09 10:41:39 +0200 (Tue, 09 Jun 2015)\");\n script_cve_id(\"CVE-2015-3456\", \"CVE-2015-1779\", \"CVE-2014-8106\", \"CVE-2014-7840\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for qemu FEDORA-2015-8249\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"qemu on Fedora 21\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-8249\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC21\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC21\")\n{\n\n if ((res = isrpmvuln(pkg:\"qemu\", rpm:\"qemu~2.1.3~7.fc21\", rls:\"FC21\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:23", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides the\nuser-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed incoming\nframes without limiting resources used to process the header and the\npayload. An attacker able to access a guest's VNC console could use this\nflaw to trigger a denial of service on the host by exhausting all available\nmemory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.\n", "modified": "2018-04-12T03:32:52", "published": "2015-10-27T04:00:00", "id": "RHSA-2015:1943", "href": "https://access.redhat.com/errata/RHSA-2015:1943", "type": "redhat", "title": "(RHSA-2015:1943) Moderate: qemu-kvm security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:54", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the\nuser-space component for running virtual machines using KVM.\n\nIt was found that the QEMU's websocket frame decoder processed incoming\nframes without limiting resources used to process the header and the\npayload. An attacker able to access a guest's VNC console could use this\nflaw to trigger a denial of service on the host by exhausting all available\nmemory and CPU. (CVE-2015-1779)\n\nThis issue was discovered by Daniel P. Berrange of Red Hat.\n\nAll qemu-kvm-rhev users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, shut down all running virtual machines. Once all virtual\nmachines have shut down, start them again for this update to take effect.", "modified": "2018-04-25T16:18:13", "published": "2015-10-26T22:09:05", "id": "RHSA-2015:1931", "href": "https://access.redhat.com/errata/RHSA-2015:1931", "type": "redhat", "title": "(RHSA-2015:1931) Moderate: qemu-kvm-rhev security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:30", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "[1.5.3-86.el7_1.8]\n- kvm-qtest-ide-test-disable-flush-test.patch [bz#1273098]\n- Resolves: bz#1273098\n (qemu-kvm build failure race condition in tests/ide-test)\n[1.5.3-86.el7_1.7]\n- kvm-CVE-2015-1779-incrementally-decode-websocket-frames.patch [bz#1205050]\n- kvm-CVE-2015-1779-limit-size-of-HTTP-headers-from-websoc.patch [bz#1205050]\n- Resolves: bz#1205050\n (CVE-2015-1779 qemu-kvm: qemu: vnc: insufficient resource limiting in VNC websockets decoder [rhel-7.1.z])", "edition": 4, "modified": "2015-10-27T00:00:00", "published": "2015-10-27T00:00:00", "id": "ELSA-2015-1943", "href": "http://linux.oracle.com/errata/ELSA-2015-1943.html", "title": "qemu-kvm security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:26", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779"], "description": "\nDaniel P. Berrange reports:\n\nThe VNC server websockets decoder will read and buffer data\n\t from websockets clients until it sees the end of the HTTP headers,\n\t as indicated by \\r\\n\\r\\n. In theory this allows a malicious to\n\t trick QEMU into consuming an arbitrary amount of RAM.\n\n", "edition": 5, "modified": "2016-12-06T00:00:00", "published": "2015-03-23T00:00:00", "id": "A228C7A0-BA66-11E6-B1CF-14DAE9D210B8", "href": "https://vuxml.freebsd.org/freebsd/a228c7a0-ba66-11e6-b1cf-14dae9d210b8.html", "title": "qemu -- denial of service vulnerability", "type": "freebsd", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:39:38", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "description": "Jason Geffner discovered that QEMU incorrectly handled the virtual floppy \ndriver. This issue is known as VENOM. A malicious guest could use this \nissue to cause a denial of service, or possibly execute arbitrary code on \nthe host as the user running the QEMU process. In the default installation, \nwhen QEMU is used with libvirt, attackers would be isolated by the libvirt \nAppArmor profile. (CVE-2015-3456)\n\nDaniel P. Berrange discovered that QEMU incorrectly handled VNC websockets. \nA remote attacker could use this issue to cause QEMU to consume memory, \nresulting in a denial of service. This issue only affected Ubuntu 14.04 \nLTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-1779)\n\nJan Beulich discovered that QEMU, when used with Xen, didn't properly \nrestrict access to PCI command registers. A malicious guest could use this \nissue to cause a denial of service. This issue only affected Ubuntu 14.04 \nLTS and Ubuntu 14.10. (CVE-2015-2756)", "edition": 5, "modified": "2015-05-13T00:00:00", "published": "2015-05-13T00:00:00", "id": "USN-2608-1", "href": "https://ubuntu.com/security/notices/USN-2608-1", "title": "QEMU vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "debian": [{"lastseen": "2020-08-12T00:55:59", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9718", "CVE-2015-1779", "CVE-2015-3456", "CVE-2015-2756"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3259-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nMay 13, 2015 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : qemu\nCVE ID : CVE-2014-9718 CVE-2015-1779 CVE-2015-2756 CVE-2015-3456\n\nSeveral vulnerabilities were discovered in the qemu virtualisation\nsolution:\n\nCVE-2014-9718\n\n It was discovered that the IDE controller emulation is susceptible\n to denial of service.\n\nCVE-2015-1779\n\n Daniel P. Berrange discovered a denial of service vulnerability in\n the VNC web socket decoder. \n\nCVE-2015-2756\n\n Jan Beulich discovered that unmediated PCI command register could\n result in denial of service.\n\nCVE-2015-3456\n\n Jason Geffner discovered a buffer overflow in the emulated floppy\n disk drive, resulting in the potential execution of arbitrary code.\n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 1.1.2+dfsg-6a+deb7u7 of the qemu source package and in version\n1.1.2+dfsg-6+deb7u7 of the qemu-kvm source package. Only CVE-2015-3456\naffects oldstable.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:2.1+dfsg-12.\n\nFor the unstable distribution (sid), these problems will be fixed soon.\n\nWe recommend that you upgrade your qemu packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2015-05-13T16:08:21", "published": "2015-05-13T16:08:21", "id": "DEBIAN:DSA-3259-1:EB11E", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00148.html", "title": "[SECURITY] [DSA 3259-1] qemu security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:27", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8567", "CVE-2015-8556", "CVE-2015-8558", "CVE-2015-6855", "CVE-2015-8666", "CVE-2015-1779", "CVE-2015-7504", "CVE-2015-5225", "CVE-2015-3456", "CVE-2015-7512", "CVE-2015-5279", "CVE-2015-5745", "CVE-2015-8345", "CVE-2015-8568", "CVE-2015-8744", "CVE-2015-7549", "CVE-2015-8743", "CVE-2016-1568", "CVE-2015-8701", "CVE-2015-8745", "CVE-2015-8504", "CVE-2015-6815", "CVE-2015-7295", "CVE-2015-5278"], "edition": 1, "description": "### Background\n\nQEMU is a generic and open source machine emulator and virtualizer.\n\n### Description\n\nMultiple vulnerabilities have been discovered in QEMU. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker might cause a Denial of Service or gain escalated privileges from a guest VM. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll QEMU users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/qemu-2.5.0-r1\"", "modified": "2016-02-04T00:00:00", "published": "2016-02-04T00:00:00", "id": "GLSA-201602-01", "href": "https://security.gentoo.org/glsa/201602-01", "type": "gentoo", "title": "QEMU: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}