FreeBSD : xen-tools -- Unmediated PCI register access in qemu (3d657340-27ea-11e5-a4a5-002590263bf5)

medium Nessus Plugin ID 84699

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Xen Project reports :

Qemu allows guests to not only read, but also write all parts of the PCI config space (but not extended config space) of passed through PCI devices not explicitly dealt with for (partial) emulation purposes.

Since the effect depends on the specific purpose of the the config space field, it's not possible to give a general statement about the exact impact on the host or other guests. Privilege escalation, host crash (Denial of Service), and leaked information all cannot be excluded.

Solution

Update the affected package.

See Also

http://xenbits.xen.org/xsa/advisory-131.html

http://www.nessus.org/u?fb7c9880

Plugin Details

Severity: Medium

ID: 84699

File Name: freebsd_pkg_3d65734027ea11e5a4a5002590263bf5.nasl

Version: 2.6

Type: local

Published: 7/14/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xen-tools, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/11/2015

Vulnerability Publication Date: 6/2/2015

Reference Information

CVE: CVE-2015-4106