Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.58953
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2007:0323
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0323.

The Xen package contains the tools for managing the virtual machine monitor
in Red Hat Enterprise Linux virtualization.

The following security flaws are fixed in the updated Xen package:

Joris van Rantwijk found a flaw in the Pygrub utility which is used as a
boot loader for guest domains. A malicious local administrator of a guest
domain could create a carefully crafted grub.conf file which would trigger
the execution of arbitrary code outside of that domain. (CVE-2007-4993)

Tavis Ormandy discovered a heap overflow flaw during video-to-video copy
operations in the Cirrus VGA extension code used in Xen. A malicious local
administrator of a guest domain could potentially trigger this flaw and
execute arbitrary code outside of the domain. (CVE-2007-1320)

Tavis Ormandy discovered insufficient input validation leading to a heap
overflow in the Xen NE2000 network driver. If the driver is in use, a
malicious local administrator of a guest domain could potentially trigger
this flaw and execute arbitrary code outside of the domain. Xen does not
use this driver by default. (CVE-2007-1321)

Users of Xen should update to these erratum packages containing backported
patches which correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0323.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
7.2

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-1320
BugTraq ID: 23731
http://www.securityfocus.com/bid/23731
Debian Security Information: DSA-1284 (Google Search)
http://www.debian.org/security/2007/dsa-1284
Debian Security Information: DSA-1384 (Google Search)
http://www.debian.org/security/2007/dsa-1384
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://taviso.decsystem.org/virtsec.pdf
http://osvdb.org/35494
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://secunia.com/advisories/25073
http://secunia.com/advisories/25095
http://secunia.com/advisories/27047
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27486
http://secunia.com/advisories/29129
http://secunia.com/advisories/30413
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2007/1597
Common Vulnerability Exposure (CVE) ID: CVE-2007-1321
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.html
http://osvdb.org/35495
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9302
http://securitytracker.com/id?1018761
http://secunia.com/advisories/27072
http://www.attrition.org/pipermail/vim/2007-October/001842.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-4993
20071008 rPSA-2007-0210-1 xen
http://www.securityfocus.com/archive/1/481825/100/0/threaded
25825
http://www.securityfocus.com/bid/25825
26986
http://secunia.com/advisories/26986
27047
27072
27085
27103
27141
http://secunia.com/advisories/27141
27161
http://secunia.com/advisories/27161
27486
ADV-2007-3348
http://www.vupen.com/english/advisories/2007/3348
DSA-1384
FEDORA-2007-2270
FEDORA-2007-2708
FEDORA-2007-713
MDKSA-2007:203
RHSA-2007:0323
USN-527-1
http://www.ubuntu.com/usn/usn-527-1
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
https://issues.rpath.com/browse/RPL-1752
oval:org.mitre.oval:def:11240
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.