|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-527-1 (xen-3.0)|
|Summary:||Ubuntu USN-527-1 (xen-3.0)|
The remote host is missing an update to xen-3.0
announced via advisory USN-527-1.
A security issue affects the following Ubuntu releases:
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
Joris van Rantwijk discovered that the Xen host did not correctly validate
the contents of a Xen guests's grug.conf file. Xen guest root users could
exploit this to run arbitrary commands on the host when the guest system
The problem can be corrected by upgrading your system to the
following package versions:
In general, a standard system upgrade is sufficient to affect the
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2007-4993|
Bugtraq: 20071008 rPSA-2007-0210-1 xen (Google Search)
Debian Security Information: DSA-1384 (Google Search)
BugTraq ID: 25825
|Copyright||Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58880 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.