![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.69702 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 15 FEDORA-2011-6859 (xen) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to xen announced via advisory FEDORA-2011-6859. Update Information: Overflows in kernel decompression can allow root on xen PV guest to gain privileged access to base domain, or access to xen configuration info. Lack of error checking could allow DoS attack from guest. [CVE-2011-1583] Don't require /usr/bin/qemu-nbd as it isn't used at present. Solution: Apply the appropriate updates. This update can be installed with the yum update program. Use su -c 'yum update xen' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-6859 Risk factor : High CVSS Score: 6.9 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1583 RHSA-2011:0496 http://rhn.redhat.com/errata/RHSA-2011-0496.html [Xen-devel] 20110509 Re: Xen security advisory CVE-2011-1583 - pv kernel image validation http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00491.html [Xen-devel] 20110509 Xen security advisory CVE-2011-1583 - pv kernel image validation http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00483.html |
Copyright | Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |