![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.105466 |
Category: | Citrix Xenserver Local Security Checks |
Title: | Citrix XenServer Multiple Security Updates (CTX202404) |
Summary: | A number of security vulnerabilities have been identified in Citrix XenServer; that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.; These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix; XenServer 6.5 Service Pack 1. |
Description: | Summary: A number of security vulnerabilities have been identified in Citrix XenServer that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host. These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1. Vulnerability Insight: The following vulnerabilities have been addressed: CVE-2015-7835 (High): Uncontrolled creation of large page mappings by PV guests CVE-2015-7969 (Low): Leak of main per-domain vcpu pointer array/Leak of per-domain profiling-related vcpu pointer array CVE-2015-7970 (Medium): Host crash when migrating a PoD VM CVE-2015-7971 (Low): Some pmu and profiling hypercalls log without rate limiting CVE-2015-7972 (Low): Populate-on-demand balloon size inaccuracy can crash guests Affected Software/OS: Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1 Solution: Apply the hotfix referenced in the advisory. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-7835 BugTraq ID: 77366 http://www.securityfocus.com/bid/77366 Debian Security Information: DSA-3390 (Google Search) http://www.debian.org/security/2015/dsa-3390 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html https://security.gentoo.org/glsa/201604-03 https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt http://www.securitytracker.com/id/1034032 SuSE Security Announcement: openSUSE-SU-2015:1965 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html SuSE Security Announcement: openSUSE-SU-2015:2250 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html Common Vulnerability Exposure (CVE) ID: CVE-2015-7969 BugTraq ID: 77364 http://www.securityfocus.com/bid/77364 Debian Security Information: DSA-3414 (Google Search) http://www.debian.org/security/2015/dsa-3414 http://www.securitytracker.com/id/1034033 Common Vulnerability Exposure (CVE) ID: CVE-2015-7970 BugTraq ID: 77362 http://www.securityfocus.com/bid/77362 http://www.securitytracker.com/id/1034034 Common Vulnerability Exposure (CVE) ID: CVE-2015-7971 BugTraq ID: 77363 http://www.securityfocus.com/bid/77363 http://www.securitytracker.com/id/1034035 Common Vulnerability Exposure (CVE) ID: CVE-2015-7972 BugTraq ID: 77365 http://www.securityfocus.com/bid/77365 http://www.securitytracker.com/id/1034036 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |