![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.105466 |
Categoría: | Citrix Xenserver Local Security Checks |
Título: | Citrix XenServer Multiple Security Updates (CTX202404) |
Resumen: | A number of security vulnerabilities have been identified in Citrix XenServer; that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.; These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix; XenServer 6.5 Service Pack 1. |
Descripción: | Summary: A number of security vulnerabilities have been identified in Citrix XenServer that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host. These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1. Vulnerability Insight: The following vulnerabilities have been addressed: CVE-2015-7835 (High): Uncontrolled creation of large page mappings by PV guests CVE-2015-7969 (Low): Leak of main per-domain vcpu pointer array/Leak of per-domain profiling-related vcpu pointer array CVE-2015-7970 (Medium): Host crash when migrating a PoD VM CVE-2015-7971 (Low): Some pmu and profiling hypercalls log without rate limiting CVE-2015-7972 (Low): Populate-on-demand balloon size inaccuracy can crash guests Affected Software/OS: Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1 Solution: Apply the hotfix referenced in the advisory. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-7835 BugTraq ID: 77366 http://www.securityfocus.com/bid/77366 Debian Security Information: DSA-3390 (Google Search) http://www.debian.org/security/2015/dsa-3390 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html https://security.gentoo.org/glsa/201604-03 https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt http://www.securitytracker.com/id/1034032 SuSE Security Announcement: openSUSE-SU-2015:1965 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html SuSE Security Announcement: openSUSE-SU-2015:2250 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html Common Vulnerability Exposure (CVE) ID: CVE-2015-7969 BugTraq ID: 77364 http://www.securityfocus.com/bid/77364 Debian Security Information: DSA-3414 (Google Search) http://www.debian.org/security/2015/dsa-3414 http://www.securitytracker.com/id/1034033 Common Vulnerability Exposure (CVE) ID: CVE-2015-7970 BugTraq ID: 77362 http://www.securityfocus.com/bid/77362 http://www.securitytracker.com/id/1034034 Common Vulnerability Exposure (CVE) ID: CVE-2015-7971 BugTraq ID: 77363 http://www.securityfocus.com/bid/77363 http://www.securitytracker.com/id/1034035 Common Vulnerability Exposure (CVE) ID: CVE-2015-7972 BugTraq ID: 77365 http://www.securityfocus.com/bid/77365 http://www.securitytracker.com/id/1034036 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |