FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

qemu, xen and VirtualBox OSE -- possible VM escape and code execution ("VENOM")

Affected packages
qemu < 0.11.1_19
0.12 <= qemu < 2.3.0_1
qemu-devel < 0.11.1_19
0.12 <= qemu-devel < 2.3.0_1
qemu-sbruno < 2.3.50.g20150501_1
virtualbox-ose < 4.3.28
4.5.0 <= xen-tools < 4.5.0_5

Details

VuXML ID 2780e442-fc59-11e4-b18b-6805ca1d3bb1
Discovery 2015-04-29
Entry 2015-05-17
Modified 2015-09-28

Jason Geffner, CrowdStrike Senior Security Researcher reports:

VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host's local network and adjacent systems.

References

CVE Name CVE-2015-3456
FreeBSD PR ports/200255
FreeBSD PR ports/200256
FreeBSD PR ports/200257
URL http://venom.crowdstrike.com/
URL http://www.oracle.com/technetwork/topics/security/alert-cve-2015-3456-2542656.html
URL http://xenbits.xen.org/xsa/advisory-133.html