Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70551
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2337-1)
Summary:The remote host is missing an update for the Debian 'xen' package(s) announced via the DSA-2337-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'xen' package(s) announced via the DSA-2337-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in the Xen virtual machine hypervisor.

CVE-2011-1166

A 64-bit guest can get one of its vCPUs into non-kernel mode without first providing a valid non-kernel pagetable, thereby locking up the host system.

CVE-2011-1583, CVE-2011-3262 Local users can cause a denial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image.

CVE-2011-1898

When using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, guest OS users can gain host OS privileges by writing to the interrupt injection registers.

The oldstable distribution (lenny) contains a different version of Xen not affected by these problems.

For the stable distribution (squeeze), this problem has been fixed in version 4.0.1-4.

For the testing (wheezy) and unstable distribution (sid), this problem has been fixed in version 4.1.1-1.

We recommend that you upgrade your xen packages.

Affected Software/OS:
'xen' package(s) on Debian 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.4

CVSS Vector:
AV:A/AC:M/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1166
RHSA-2011:0833
http://rhn.redhat.com/errata/RHSA-2011-0833.html
http://downloads.avaya.com/css/P8/documents/100145416
http://wiki.xen.org/wiki/Security_Announcements#XSA-1_Host_crash_due_to_failure_to_correctly_validate_PV_kernel_execution_state.
Common Vulnerability Exposure (CVE) ID: CVE-2011-1583
RHSA-2011:0496
http://rhn.redhat.com/errata/RHSA-2011-0496.html
[Xen-devel] 20110509 Re: Xen security advisory CVE-2011-1583 - pv kernel image validation
http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00491.html
[Xen-devel] 20110509 Xen security advisory CVE-2011-1583 - pv kernel image validation
http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00483.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-1898
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.html
http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html
http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf
http://xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html
SuSE Security Announcement: SUSE-SU-2011:0942 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html
SuSE Security Announcement: openSUSE-SU-2011:0941 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-3262
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://secunia.com/advisories/55082
XForce ISS Database: xen-xcdombzimageloader-dos(69381)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69381
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.