Búsqueda de    
Vulnerabilidad   
    Buscar 191973 Descripciones CVE y
86218 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.105466
Categoría:Citrix Xenserver Local Security Checks
Título:Citrix XenServer Multiple Security Updates (CTX202404)
Resumen:A number of security vulnerabilities have been identified in Citrix XenServer; that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.; These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix; XenServer 6.5 Service Pack 1.
Descripción:Summary:
A number of security vulnerabilities have been identified in Citrix XenServer
that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.
These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix
XenServer 6.5 Service Pack 1.

Vulnerability Insight:
The following vulnerabilities have been addressed:

CVE-2015-7835 (High): Uncontrolled creation of large page mappings by PV guests

CVE-2015-7969 (Low): Leak of main per-domain vcpu pointer array/Leak of per-domain profiling-related vcpu pointer array

CVE-2015-7970 (Medium): Host crash when migrating a PoD VM

CVE-2015-7971 (Low): Some pmu and profiling hypercalls log without rate limiting

CVE-2015-7972 (Low): Populate-on-demand balloon size inaccuracy can crash guests

Affected Software/OS:
Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1

Solution:
Apply the hotfix referenced in the advisory.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-7835
BugTraq ID: 77366
http://www.securityfocus.com/bid/77366
Debian Security Information: DSA-3390 (Google Search)
http://www.debian.org/security/2015/dsa-3390
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
https://security.gentoo.org/glsa/201604-03
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
http://www.securitytracker.com/id/1034032
SuSE Security Announcement: openSUSE-SU-2015:1965 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
SuSE Security Announcement: openSUSE-SU-2015:2250 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-7969
BugTraq ID: 77364
http://www.securityfocus.com/bid/77364
Debian Security Information: DSA-3414 (Google Search)
http://www.debian.org/security/2015/dsa-3414
http://www.securitytracker.com/id/1034033
Common Vulnerability Exposure (CVE) ID: CVE-2015-7970
BugTraq ID: 77362
http://www.securityfocus.com/bid/77362
http://www.securitytracker.com/id/1034034
Common Vulnerability Exposure (CVE) ID: CVE-2015-7971
BugTraq ID: 77363
http://www.securityfocus.com/bid/77363
http://www.securitytracker.com/id/1034035
Common Vulnerability Exposure (CVE) ID: CVE-2015-7972
BugTraq ID: 77365
http://www.securityfocus.com/bid/77365
http://www.securitytracker.com/id/1034036
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Esta es sólo una de 86218 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2020 E-Soft Inc. Todos los derechos reservados.