Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106911
Kategorie:Citrix Xenserver Local Security Checks
Titel:Citrix XenServer Multiple Security Updates (CTX223291)
Zusammenfassung:A number of security issues have been identified within Citrix XenServer.; These issues could, if exploited, allow a malicious administrator of a PV guest VM to compromise the host.
Beschreibung:Summary:
A number of security issues have been identified within Citrix XenServer.
These issues could, if exploited, allow a malicious administrator of a PV guest VM to compromise the host.

Vulnerability Insight:
The following vulnerabilities have been addressed:

- CVE-2017-8903 (High): x86: 64bit PV guest breakout via pagetable use-after-mode-change

- CVE-2017-8904 (High): grant transfer allows PV guest to elevate privileges

- CVE-2017-8905 (Low): possible memory corruption via failsafe callback

Affected Software/OS:
XenServer versions 7.1, 7.0, 6.5, 6.2.0, 6.0.2.

Solution:
Apply the hotfix referenced in the advisory.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-8903
BugTraq ID: 98426
http://www.securityfocus.com/bid/98426
https://security.gentoo.org/glsa/201705-11
http://www.securitytracker.com/id/1038386
Common Vulnerability Exposure (CVE) ID: CVE-2017-8904
BugTraq ID: 98428
http://www.securityfocus.com/bid/98428
http://www.securitytracker.com/id/1038387
Common Vulnerability Exposure (CVE) ID: CVE-2017-8905
BugTraq ID: 98436
http://www.securityfocus.com/bid/98436
http://www.securitytracker.com/id/1038388
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.