Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105466
Category:Citrix Xenserver Local Security Checks
Title:Citrix XenServer Multiple Security Updates (CTX202404)
Summary:A number of security vulnerabilities have been identified in Citrix XenServer; that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.; These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix; XenServer 6.5 Service Pack 1.
Description:Summary:
A number of security vulnerabilities have been identified in Citrix XenServer
that may allow a malicious administrator of a guest VM to compromise the host and guest users to crash the host.
These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix
XenServer 6.5 Service Pack 1.

Vulnerability Insight:
The following vulnerabilities have been addressed:

CVE-2015-7835 (High): Uncontrolled creation of large page mappings by PV guests

CVE-2015-7969 (Low): Leak of main per-domain vcpu pointer array/Leak of per-domain profiling-related vcpu pointer array

CVE-2015-7970 (Medium): Host crash when migrating a PoD VM

CVE-2015-7971 (Low): Some pmu and profiling hypercalls log without rate limiting

CVE-2015-7972 (Low): Populate-on-demand balloon size inaccuracy can crash guests

Affected Software/OS:
Citrix XenServer up to and including Citrix XenServer 6.5 Service Pack 1

Solution:
Apply the hotfix referenced in the advisory.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-7835
BugTraq ID: 77366
http://www.securityfocus.com/bid/77366
Debian Security Information: DSA-3390 (Google Search)
http://www.debian.org/security/2015/dsa-3390
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
https://security.gentoo.org/glsa/201604-03
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
http://www.securitytracker.com/id/1034032
SuSE Security Announcement: openSUSE-SU-2015:1965 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
SuSE Security Announcement: openSUSE-SU-2015:2250 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-7969
BugTraq ID: 77364
http://www.securityfocus.com/bid/77364
Debian Security Information: DSA-3414 (Google Search)
http://www.debian.org/security/2015/dsa-3414
http://www.securitytracker.com/id/1034033
Common Vulnerability Exposure (CVE) ID: CVE-2015-7970
BugTraq ID: 77362
http://www.securityfocus.com/bid/77362
http://www.securitytracker.com/id/1034034
Common Vulnerability Exposure (CVE) ID: CVE-2015-7971
BugTraq ID: 77363
http://www.securityfocus.com/bid/77363
http://www.securitytracker.com/id/1034035
Common Vulnerability Exposure (CVE) ID: CVE-2015-7972
BugTraq ID: 77365
http://www.securityfocus.com/bid/77365
http://www.securitytracker.com/id/1034036
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.