Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.843452
Categoría:Ubuntu Local Security Checks
Título:Ubuntu Update for qemu USN-3575-1
Resumen:The remote host is missing an update for the 'qemu'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'qemu'
package(s) announced via the referenced advisory.

Vulnerability Insight:
It was discovered that QEMU incorrectly
handled guest ram. A privileged attacker inside the guest could use this issue
to cause QEMU to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-11334) David Buchanan
discovered that QEMU incorrectly handled the VGA device. A privileged attacker
inside the guest could use this issue to cause QEMU to crash, resulting in a
denial of service. This issue was only addressed in Ubuntu 17.10.
(CVE-2017-13672) Thomas Garnier discovered that QEMU incorrectly handled
multiboot. An attacker could use this issue to cause QEMU to crash, resulting in
a denial of service, or possibly execute arbitrary code on the host. In the
default installation, when QEMU is used with libvirt, attackers would be
isolated by the libvirt AppArmor profile. This issue only affected Ubuntu 14.04
LTS and Ubuntu 16.04 LTS. (CVE-2017-14167) Tuomas Tynkkynen discovered that QEMU
incorrectly handled VirtFS directory sharing. An attacker could use this issue
to obtain sensitive information from host memory. (CVE-2017-15038) Eric Blake
discovered that QEMU incorrectly handled memory in the NBD server. An attacker
could use this issue to cause the NBD server to crash, resulting in a denial of
service. This issue only affected Ubuntu 17.10. (CVE-2017-15118) Eric Blake
discovered that QEMU incorrectly handled certain options to the NBD server. An
attacker could use this issue to cause the NBD server to crash, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04
LTS. (CVE-2017-15119) Daniel Berrange discovered that QEMU incorrectly handled
the VNC server. A remote attacker could possibly use this issue to consume
memory, resulting in a denial of service. This issue was only addressed in
Ubuntu 17.10. (CVE-2017-15124) Carl Brassey discovered that QEMU incorrectly
handled certain websockets. A remote attacker could possibly use this issue to
consume memory, resulting in a denial of service. This issue only affected
Ubuntu 17.10. (CVE-2017-15268) Guoxiang Niu discovered that QEMU incorrectly
handled the Cirrus VGA device. A privileged attacker inside the guest could use
this issue to cause QEMU to crash, resulting in a denial of service.
(CVE-2017-15289) Cyrille Chatras discovered that QEMU incorrectly handled
certain PS2 values during migration. An attacker could possibly use this issue
to cause QEMU to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.
(CVE-2017-1 ... Description truncated, for more information please check the
Reference URL

Affected Software/OS:
qemu on Ubuntu 17.10,
Ubuntu 16.04 LTS,
Ubuntu 14.04 LTS

Solution:
Please Install the Updated Packages.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2018-5683
BugTraq ID: 102518
http://www.securityfocus.com/bid/102518
Debian Security Information: DSA-4213 (Google Search)
https://www.debian.org/security/2018/dsa-4213
https://lists.gnu.org/archive/html/qemu-devel/2018-01/msg02597.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
http://www.openwall.com/lists/oss-security/2018/01/15/2
RedHat Security Advisories: RHSA-2018:0816
https://access.redhat.com/errata/RHSA-2018:0816
RedHat Security Advisories: RHSA-2018:1104
https://access.redhat.com/errata/RHSA-2018:1104
RedHat Security Advisories: RHSA-2018:2162
https://access.redhat.com/errata/RHSA-2018:2162
https://usn.ubuntu.com/3575-1/
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.