Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.703038
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-3038-1)
Summary:The remote host is missing an update for the Debian 'libvirt' package(s) announced via the DSA-3038-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libvirt' package(s) announced via the DSA-3038-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in Libvirt, a virtualisation abstraction library. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2014-0179

Richard Jones and Daniel P. Berrange found that libvirt passes the XML_PARSE_NOENT flag when parsing XML documents using the libxml2 library, in which case all XML entities in the parsed documents are expanded. A user able to force libvirtd to parse an XML document with an entity pointing to a special file that blocks on read access could use this flaw to cause libvirtd to hang indefinitely, resulting in a denial of service on the system.

CVE-2014-3633

Luyao Huang of Red Hat found that the qemu implementation of virDomainGetBlockIoTune computed an index into the array of disks for the live definition, then used it as the index into the array of disks for the persistent definition, which could result into an out-of-bounds read access in qemuDomainGetBlockIoTune().

A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, leak memory from the libvirtd process.

For the stable distribution (wheezy), these problems have been fixed in version 0.9.12.3-1+deb7u1.

For the unstable distribution (sid), these problems have been fixed in version 1.2.8-2.

We recommend that you upgrade your libvirt packages.

Affected Software/OS:
'libvirt' package(s) on Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-0179
60895
http://secunia.com/advisories/60895
DSA-3038
http://www.debian.org/security/2014/dsa-3038
GLSA-201412-04
http://security.gentoo.org/glsa/glsa-201412-04.xml
RHSA-2014:0560
http://rhn.redhat.com/errata/RHSA-2014-0560.html
USN-2366-1
http://www.ubuntu.com/usn/USN-2366-1
http://libvirt.org/news.html
http://security.libvirt.org/2014/0003.html
openSUSE-SU-2014:0650
http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
openSUSE-SU-2014:0674
http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-3633
60291
http://secunia.com/advisories/60291
RHSA-2014:1352
http://rhn.redhat.com/errata/RHSA-2014-1352.html
http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b
http://security.libvirt.org/2014/0004.html
openSUSE-SU-2014:1290
http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
openSUSE-SU-2014:1293
http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
CopyrightCopyright (C) 2014 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.