diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 349d2e3b90a1..ea034d72dffb 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> + + qemu -- "drive_init()" Disk Format Security Bypass + + + qemu + qemu-devel + 0.9.1_6 + 0.9.1s.20070101*0.9.1s.20080302_6 + + + + +

Secunia reports:

+
+

A vulnerability has been reported in QEMU, which can be exploited + by malicious, local users to bypass certain security + restrictions.

+

The vulnerability is caused due to the "drive_init()" function + in vl.c determining the format of a disk from data contained in + the disk's header. This can be exploited by a malicious user in + a guest system to e.g. read arbitrary files on the host by + writing a fake header to a raw formatted disk image.

+
+ +
+ + CVE-2008-2004 + http://secunia.com/advisories/30111/ + http://lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html + + + 2008-04-28 + 2008-05-08 + +
+ swfdec -- exposure of sensitive information