![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.105466 |
Kategorie: | Citrix Xenserver Local Security Checks |
Titel: | Citrix XenServer Multiple Security Updates (CTX202404) |
Zusammenfassung: | A number of security vulnerabilities have been identified in Citrix XenServer; that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.; These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix; XenServer 6.5 Service Pack 1. |
Beschreibung: | Summary: A number of security vulnerabilities have been identified in Citrix XenServer that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host. These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1. Vulnerability Insight: The following vulnerabilities have been addressed: CVE-2015-7835 (High): Uncontrolled creation of large page mappings by PV guests CVE-2015-7969 (Low): Leak of main per-domain vcpu pointer array/Leak of per-domain profiling-related vcpu pointer array CVE-2015-7970 (Medium): Host crash when migrating a PoD VM CVE-2015-7971 (Low): Some pmu and profiling hypercalls log without rate limiting CVE-2015-7972 (Low): Populate-on-demand balloon size inaccuracy can crash guests Affected Software/OS: Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1 Solution: Apply the hotfix referenced in the advisory. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-7835 BugTraq ID: 77366 http://www.securityfocus.com/bid/77366 Debian Security Information: DSA-3390 (Google Search) http://www.debian.org/security/2015/dsa-3390 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html https://security.gentoo.org/glsa/201604-03 https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt http://www.securitytracker.com/id/1034032 SuSE Security Announcement: openSUSE-SU-2015:1965 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html SuSE Security Announcement: openSUSE-SU-2015:2250 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html Common Vulnerability Exposure (CVE) ID: CVE-2015-7969 BugTraq ID: 77364 http://www.securityfocus.com/bid/77364 Debian Security Information: DSA-3414 (Google Search) http://www.debian.org/security/2015/dsa-3414 http://www.securitytracker.com/id/1034033 Common Vulnerability Exposure (CVE) ID: CVE-2015-7970 BugTraq ID: 77362 http://www.securityfocus.com/bid/77362 http://www.securitytracker.com/id/1034034 Common Vulnerability Exposure (CVE) ID: CVE-2015-7971 BugTraq ID: 77363 http://www.securityfocus.com/bid/77363 http://www.securitytracker.com/id/1034035 Common Vulnerability Exposure (CVE) ID: CVE-2015-7972 BugTraq ID: 77365 http://www.securityfocus.com/bid/77365 http://www.securitytracker.com/id/1034036 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |