Index: vuln.xml =================================================================== RCS file: /home/pcvs/ports/security/vuxml/vuln.xml,v retrieving revision 1.1622 diff -u -p -r1.1622 vuln.xml --- vuln.xml 8 May 2008 08:22:39 -0000 1.1622 +++ vuln.xml 8 May 2008 19:18:12 -0000 @@ -34,6 +34,42 @@ Note: Please add new entries to the beg --> + + qemu -- "drive_init()" Disk Format Security Bypass + + + qemu + qemu-devel + 0.9.1_6 + 0.9.1s.20070101*0.9.1s.20080302_6 + + + + +

Secunia reports:

+
+

A vulnerability has been reported in QEMU, which can be exploited + by malicious, local users to bypass certain security + restrictions.

+

The vulnerability is caused due to the "drive_init()" function + in vl.c determining the format of a disk from data contained in + the disk's header. This can be exploited by a malicious user in + a guest system to e.g. read arbitrary files on the host by + writing a fake header to a raw formatted disk image.

+
+ +
+ + CVE-2008-2004 + http://secunia.com/advisories/30111/ + http://lists.gnu.org/archive/html/qemu-devel/2008-04/msg00675.html + + + 2008-04-28 + 2008-05-08 + +
+ swfdec -- exposure of sensitive information