FreeBSD Ports: qemu, qemu-devel

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://secunia.com/advisories/29172 http://secunia.com/advisories/29081 http://lists.debian.org/debian-security/2008/02/msg00064.html http://www.vuxml.org/freebsd/9cfbca7f-efb7-11dc-be01-0211060005df.html
Insight
The following packages are affected: qemu qemu-devel CVE-2008-0928 Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.