Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.882324
Categoría:CentOS Local Security Checks
Título:CentOS Update for xen CESA-2015:2065 centos5
Resumen:Check the version of xen
Descripción:Summary:
Check the version of xen

Vulnerability Insight:
The xen packages contain administration
tools and the xend service for managing the kernel-xen kernel for
virtualization on Red Hat Enterprise Linux.

A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC
emulation implementation handled certain packets received over the network.
A privileged user inside a guest could use this flaw to crash the QEMU
instance (denial of service) or potentially execute arbitrary code on the
host. (CVE-2015-5279)

Red Hat would like to thank Qinghao Tang of QIHU 360 Inc. for reporting
this issue.

All xen users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, all running fully-virtualized guests must be restarted
for this update to take effect.

Affected Software/OS:
xen on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-5279
1033569
http://www.securitytracker.com/id/1033569
76746
http://www.securityfocus.com/bid/76746
DSA-3361
http://www.debian.org/security/2015/dsa-3361
DSA-3362
http://www.debian.org/security/2015/dsa-3362
FEDORA-2015-16368
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html
FEDORA-2015-16369
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html
FEDORA-2015-16370
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html
GLSA-201602-01
https://security.gentoo.org/glsa/201602-01
RHSA-2015:1896
http://rhn.redhat.com/errata/RHSA-2015-1896.html
RHSA-2015:1923
http://rhn.redhat.com/errata/RHSA-2015-1923.html
RHSA-2015:1924
http://rhn.redhat.com/errata/RHSA-2015-1924.html
RHSA-2015:1925
http://rhn.redhat.com/errata/RHSA-2015-1925.html
SUSE-SU-2015:1782
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
[Qemu-devel] 20150915 [PULL 2/3] net: add checks to validate ring buffer pointers
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html
[oss-security] 20150915 CVE-2015-5279 Qemu: net: add checks to validate ring buffer pointers
http://www.openwall.com/lists/oss-security/2015/09/15/3
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.