Vigil@nce - Qemu, Xen: privilege escalation via the emulated floppy disk drive, VENOM
July 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can trigger a buffer overflow attack in the
emulated floppy disk controller of Qemu, in order to escalate his
privileges.
Impacted products: XenServer, Debian, BIG-IP Appliance, Fedora,
JUNOS, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES,
Ubuntu, Unix (platform), Xen
Severity: 2/4
Creation date: 13/05/2015
DESCRIPTION OF THE VULNERABILITY
The Xen product can emulate a floppy drive with qemu.
However, several fdctrl_*() functions of the hw/fdc.c file of qemu
do not check the index of an array.
A local attacker can therefore trigger a buffer overflow attack in
the emulated floppy disk controller of Qemu, in order to escalate
his privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN