QEMU Security Bypass Vulnerability
BID:30604
Info
QEMU Security Bypass Vulnerability
| Bugtraq ID: | 30604 |
| Class: | Access Validation Error |
| CVE: |
CVE-2008-1945 |
| Remote: | No |
| Local: | Yes |
| Published: | Aug 07 2008 12:00AM |
| Updated: | May 25 2009 07:30PM |
| Credit: | The vendor disclosed this issue. |
| Vulnerable: |
XenSource Xen 3.2 XenSource Xen 3.1.2 XenSource Xen 3.1.1 XenSource Xen 3.0.3 XenSource Xen 3.0 Ubuntu Ubuntu Linux 8.10 sparc Ubuntu Ubuntu Linux 8.10 powerpc Ubuntu Ubuntu Linux 8.10 lpia Ubuntu Ubuntu Linux 8.10 i386 Ubuntu Ubuntu Linux 8.10 amd64 Ubuntu Ubuntu Linux 8.04 LTS sparc Ubuntu Ubuntu Linux 8.04 LTS powerpc Ubuntu Ubuntu Linux 8.04 LTS lpia Ubuntu Ubuntu Linux 8.04 LTS i386 Ubuntu Ubuntu Linux 8.04 LTS amd64 SuSE SUSE Linux Enterprise Server 11 SuSE SUSE Linux Enterprise Server 10 S.u.S.E. openSUSE 11.1 S.u.S.E. openSUSE 11.0 S.u.S.E. openSUSE 10.3 Redhat Enterprise Linux Virtualization 5 Server Redhat Enterprise Linux Desktop Multi OS 5 client Redhat Enterprise Linux Desktop 5 client Redhat Enterprise Linux 5 Server QEMU QEMU 0 Pardus Linux 2008 0 Mandriva Linux Mandrake 2008.1 x86_64 Mandriva Linux Mandrake 2008.1 Mandriva Linux Mandrake 2008.0 x86_64 Mandriva Linux Mandrake 2008.0 Debian Linux 5.0 sparc Debian Linux 5.0 s/390 Debian Linux 5.0 powerpc Debian Linux 5.0 mipsel Debian Linux 5.0 mips Debian Linux 5.0 m68k Debian Linux 5.0 ia-64 Debian Linux 5.0 ia-32 Debian Linux 5.0 hppa Debian Linux 5.0 armel Debian Linux 5.0 arm Debian Linux 5.0 amd64 Debian Linux 5.0 alpha Debian Linux 5.0 Debian Linux 4.0 sparc Debian Linux 4.0 s/390 Debian Linux 4.0 powerpc Debian Linux 4.0 mipsel Debian Linux 4.0 mips Debian Linux 4.0 m68k Debian Linux 4.0 ia-64 Debian Linux 4.0 ia-32 Debian Linux 4.0 hppa Debian Linux 4.0 armel Debian Linux 4.0 arm Debian Linux 4.0 amd64 Debian Linux 4.0 alpha Debian Linux 4.0 |
| Not Vulnerable: | |
Discussion
QEMU Security Bypass Vulnerability
QEMU is prone to a security-bypass vulnerability because the application fails to properly restrict access to certain functionality.
Attackers in a guest system can exploit this issue to bypass certain security restrictions and carry out some unauthorized tasks. This may lead to various attacks.
QEMU is prone to a security-bypass vulnerability because the application fails to properly restrict access to certain functionality.
Attackers in a guest system can exploit this issue to bypass certain security restrictions and carry out some unauthorized tasks. This may lead to various attacks.
Exploit / POC
QEMU Security Bypass Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
QEMU Security Bypass Vulnerability
Solution:
Updates are available. Please see the references for more information.
Ubuntu Ubuntu Linux 8.04 LTS powerpc
Ubuntu Ubuntu Linux 8.10 powerpc
Ubuntu Ubuntu Linux 8.04 LTS sparc
Ubuntu Ubuntu Linux 8.10 i386
Debian Linux 5.0 ia-32
Ubuntu Ubuntu Linux 8.04 LTS amd64
Ubuntu Ubuntu Linux 8.04 LTS lpia
Ubuntu Ubuntu Linux 8.10 lpia
Debian Linux 4.0 amd64
Debian Linux 4.0 ia-32
Ubuntu Ubuntu Linux 8.10 sparc
Ubuntu Ubuntu Linux 8.04 LTS i386
Debian Linux 5.0 amd64
Debian Linux 5.0 powerpc
Ubuntu Ubuntu Linux 8.10 amd64
Debian Linux 5.0 sparc
Solution:
Updates are available. Please see the references for more information.
Ubuntu Ubuntu Linux 8.04 LTS powerpc
-
Ubuntu kvm-source_62+dfsg-0ubuntu8.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.1_all.deb -
Ubuntu kvm-source_62+dfsg-0ubuntu8.2_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.2_all.deb
Ubuntu Ubuntu Linux 8.10 powerpc
-
Ubuntu kvm-source_72+dfsg-1ubuntu6.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_72+df sg-1ubuntu6.1_all.deb
Ubuntu Ubuntu Linux 8.04 LTS sparc
-
Ubuntu kvm-source_62+dfsg-0ubuntu8.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.1_all.deb -
Ubuntu kvm-source_62+dfsg-0ubuntu8.2_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.2_all.deb
Ubuntu Ubuntu Linux 8.10 i386
-
Ubuntu kvm-source_72+dfsg-1ubuntu6.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_72+df sg-1ubuntu6.1_all.deb -
Ubuntu kvm_72+dfsg-1ubuntu6.1_i386.deb
http://security.ubuntu.com/ubuntu/pool/main/k/kvm/kvm_72+dfsg-1ubuntu6 .1_i386.deb
Debian Linux 5.0 ia-32
-
Debian qemu_0.9.1-10lenny1_i386.deb
http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny 1_i386.deb
Ubuntu Ubuntu Linux 8.04 LTS amd64
-
Ubuntu kvm-source_62+dfsg-0ubuntu8.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.1_all.deb -
Ubuntu kvm-source_62+dfsg-0ubuntu8.2_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.2_all.deb -
Ubuntu kvm_62+dfsg-0ubuntu8.1_amd64.deb
http://security.ubuntu.com/ubuntu/pool/main/k/kvm/kvm_62+dfsg-0ubuntu8 .1_amd64.deb -
Ubuntu kvm_62+dfsg-0ubuntu8.2_amd64.deb
http://security.ubuntu.com/ubuntu/pool/main/k/kvm/kvm_62+dfsg-0ubuntu8 .2_amd64.deb
Ubuntu Ubuntu Linux 8.04 LTS lpia
-
Ubuntu kvm-source_62+dfsg-0ubuntu8.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.1_all.deb -
Ubuntu kvm-source_62+dfsg-0ubuntu8.2_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.2_all.deb
Ubuntu Ubuntu Linux 8.10 lpia
-
Ubuntu kvm-source_72+dfsg-1ubuntu6.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_72+df sg-1ubuntu6.1_all.deb
Debian Linux 4.0 amd64
-
Debian qemu_0.8.2-4etch3_amd64.deb
http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3_ amd64.deb
Debian Linux 4.0 ia-32
-
Debian qemu_0.8.2-4etch3_i386.deb
http://security.debian.org/pool/updates/main/q/qemu/qemu_0.8.2-4etch3_ i386.deb
Ubuntu Ubuntu Linux 8.10 sparc
-
Ubuntu kvm-source_72+dfsg-1ubuntu6.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_72+df sg-1ubuntu6.1_all.deb
Ubuntu Ubuntu Linux 8.04 LTS i386
-
Ubuntu kvm-source_62+dfsg-0ubuntu8.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.1_all.deb -
Ubuntu kvm-source_62+dfsg-0ubuntu8.2_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_62+df sg-0ubuntu8.2_all.deb -
Ubuntu kvm_62+dfsg-0ubuntu8.1_i386.deb
http://security.ubuntu.com/ubuntu/pool/main/k/kvm/kvm_62+dfsg-0ubuntu8 .1_i386.deb -
Ubuntu kvm_62+dfsg-0ubuntu8.2_i386.deb
http://security.ubuntu.com/ubuntu/pool/main/k/kvm/kvm_62+dfsg-0ubuntu8 .2_i386.deb
Debian Linux 5.0 amd64
-
Debian qemu_0.9.1-10lenny1_amd64.deb
http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny 1_amd64.deb
Debian Linux 5.0 powerpc
-
Debian qemu_0.9.1-10lenny1_powerpc.deb
http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny 1_powerpc.deb
Ubuntu Ubuntu Linux 8.10 amd64
-
Ubuntu kvm-source_72+dfsg-1ubuntu6.1_all.deb
http://security.ubuntu.com/ubuntu/pool/universe/k/kvm/kvm-source_72+df sg-1ubuntu6.1_all.deb -
Ubuntu kvm_72+dfsg-1ubuntu6.1_amd64.deb
http://security.ubuntu.com/ubuntu/pool/main/k/kvm/kvm_72+dfsg-1ubuntu6 .1_amd64.deb
Debian Linux 5.0 sparc
-
Debian qemu_0.9.1-10lenny1_sparc.deb
http://security.debian.org/pool/updates/main/q/qemu/qemu_0.9.1-10lenny 1_sparc.deb
References
QEMU Security Bypass Vulnerability
References:
References:
- QEMU Homepage (QEMU)
- RHSA-2008:0892-10 xen security and bug fix update (Red Hat)