Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106912
Kategorie:Citrix Xenserver Local Security Checks
Titel:Citrix XenServer Multiple Security Updates (CTX223291)
Zusammenfassung:A number of security issues have been identified within Citrix XenServer.
Beschreibung:Summary:
A number of security issues have been identified within Citrix XenServer.

Vulnerability Insight:
The most significant of these issues could, if exploited, allow a malicious
administrator of a 64-bit PV guest VM to compromise the host. This issue has the identifier:

- CVE-2017-7228 (High): x86: broken check in memory_exchange() permits PV guest breakout

In addition, an issue has been identified that, in certain deployments, allows a guest VM to perform a denial of
service attack against the host by repeatedly rebooting many times.

- (Low): memory leak when destroying guest without PT devices

A further issue has been identified that, in certain deployments, might allow unprivileged code within a guest to
escalate its privilege level within that same guest. This issue has the identifier:

- CVE-2016-10013 (Low): x86: Mishandling of SYSCALL singlestep during emulation

Affected Software/OS:
XenServer versions 7.1, 7.0, 6.5, 6.2.0, 6.0.2.

Solution:
Apply the hotfix referenced in the advisory.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-7228
BugTraq ID: 97375
http://www.securityfocus.com/bid/97375
Debian Security Information: DSA-3847 (Google Search)
http://www.debian.org/security/2017/dsa-3847
https://www.exploit-db.com/exploits/41870/
https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html
http://www.securitytracker.com/id/1038223
Common Vulnerability Exposure (CVE) ID: CVE-2016-10013
BugTraq ID: 94963
http://www.securityfocus.com/bid/94963
http://www.securitytracker.com/id/1037491
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.