Executive Summary
Summary | |
---|---|
Title | xen security update |
Informations | |||
---|---|---|---|
Name | DSA-3286 | First vendor Publication | 2015-06-13 |
Vendor | Debian | Last vendor Modification | 2015-06-13 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple security issues have been found in the Xen virtualisation solution: CVE-2015-3209 Matt Tait discovered a flaw in the way QEMU's AMD PCnet Ethernet emulation handles multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled can potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2015-4103 Jan Beulich discovered that the QEMU Xen code does not properly restrict write access to the host MSI message data field, allowing a malicious guest to cause a denial of service. CVE-2015-4104 Jan Beulich discovered that the QEMU Xen code does not properly restrict access to PCI MSI mask bits, allowing a malicious guest to cause a denial of service. CVE-2015-4105 Jan Beulich reported that the QEMU Xen code enables logging for PCI MSI-X pass-through error messages, allowing a malicious guest to cause a denial of service. CVE-2015-4106 Jan Beulich discovered that the QEMU Xen code does not properly restrict write access to the PCI config space for certain PCI pass-through devices, allowing a malicious guest to cause a denial of service, obtain sensitive information or potentially execute arbitrary code. CVE-2015-4163 Jan Beulich discovered that a missing version check in the GNTTABOP_swap_grant_ref hypercall handler may result in denial of service. This only applies to Debian stable/jessie. CVE-2015-4164 Andrew Cooper discovered a vulnerability in the iret hypercall handler, which may result in denial of service. For the oldstable distribution (wheezy), these problems have been fixed in version 4.1.4-3+deb7u8. For the stable distribution (jessie), these problems have been fixed in version 4.4.1-9+deb8u1. CVE-2015-3209, CVE-2015-4103, CVE-2015-4104, CVE-2015-4105 and CVE-2015-4106 don't affect the Xen package in stable jessie, it uses the standard qemu package and has already been fixed in DSA-3284-1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your xen packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3286 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-399 | Resource Management Errors |
40 % | CWE-264 | Permissions, Privileges, and Access Controls |
20 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28657 | |||
Oval ID: | oval:org.mitre.oval:def:28657 | ||
Title: | SUSE-SU-2015:1152-1 -- Security update for KVM (important) | ||
Description: | KVM was updated to fix two security issues: | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2015:1152-1 CVE-2015-3209 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | KVM |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28823 | |||
Oval ID: | oval:org.mitre.oval:def:28823 | ||
Title: | ELSA-2015-1189 -- kvm security update (important) | ||
Description: | [kvm-83-273.0.1.el5] - Added kvm-add-oracle-workaround-for-libvirt-bug.patch - Added kvm-Introduce-oel-machine-type.patch [kvm-83.273.el5] - kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896] - kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896] - kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896] - Resolves: bz#1225896 (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2015-1189 CVE-2015-3209 | Version: | 3 |
Platform(s): | Oracle Linux 5 | Product(s): | kvm kmod-kvm kmod-kvm-debug kvm-qemu-img kvm-tools |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-06-23 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10698.nasl - Type : ACT_GATHER_INFO |
2016-04-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201604-03.nasl - Type : ACT_GATHER_INFO |
2016-02-17 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL63519101.nasl - Type : ACT_GATHER_INFO |
2016-02-15 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2016-0012.nasl - Type : ACT_GATHER_INFO |
2015-12-22 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2324-1.nasl - Type : ACT_GATHER_INFO |
2015-12-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-892.nasl - Type : ACT_GATHER_INFO |
2015-11-02 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201510-02.nasl - Type : ACT_GATHER_INFO |
2015-09-30 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1643-1.nasl - Type : ACT_GATHER_INFO |
2015-09-11 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1519-1.nasl - Type : ACT_GATHER_INFO |
2015-09-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1479-2.nasl - Type : ACT_GATHER_INFO |
2015-09-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1479-1.nasl - Type : ACT_GATHER_INFO |
2015-09-02 | Name : The remote Fedora host is missing a security update. File : fedora_2015-13404.nasl - Type : ACT_GATHER_INFO |
2015-08-25 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1426-1.nasl - Type : ACT_GATHER_INFO |
2015-08-24 | Name : The remote Fedora host is missing a security update. File : fedora_2015-13358.nasl - Type : ACT_GATHER_INFO |
2015-08-18 | Name : The remote Fedora host is missing a security update. File : fedora_2015-13402.nasl - Type : ACT_GATHER_INFO |
2015-07-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_cbe1a0f927e911e5a4a5002590263bf5.nasl - Type : ACT_GATHER_INFO |
2015-07-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_af38cfec27e711e5a4a5002590263bf5.nasl - Type : ACT_GATHER_INFO |
2015-07-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_8c31b28827ec11e5a4a5002590263bf5.nasl - Type : ACT_GATHER_INFO |
2015-07-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_80e846ff27eb11e5a4a5002590263bf5.nasl - Type : ACT_GATHER_INFO |
2015-07-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4db8a0f427e911e5a4a5002590263bf5.nasl - Type : ACT_GATHER_INFO |
2015-07-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_3d65734027ea11e5a4a5002590263bf5.nasl - Type : ACT_GATHER_INFO |
2015-07-09 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1206-1.nasl - Type : ACT_GATHER_INFO |
2015-07-06 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150625_kvm_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2015-06-30 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1157-1.nasl - Type : ACT_GATHER_INFO |
2015-06-30 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1156-1.nasl - Type : ACT_GATHER_INFO |
2015-06-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1152-1.nasl - Type : ACT_GATHER_INFO |
2015-06-29 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_acd5d0371c3311e5be9c6805ca1d3bb1.nasl - Type : ACT_GATHER_INFO |
2015-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-1189.nasl - Type : ACT_GATHER_INFO |
2015-06-26 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-1189.nasl - Type : ACT_GATHER_INFO |
2015-06-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-1189.nasl - Type : ACT_GATHER_INFO |
2015-06-25 | Name : The remote Fedora host is missing a security update. File : fedora_2015-9978.nasl - Type : ACT_GATHER_INFO |
2015-06-25 | Name : The remote Fedora host is missing a security update. File : fedora_2015-9965.nasl - Type : ACT_GATHER_INFO |
2015-06-25 | Name : The remote Fedora host is missing a security update. File : fedora_2015-10001.nasl - Type : ACT_GATHER_INFO |
2015-06-23 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-435.nasl - Type : ACT_GATHER_INFO |
2015-06-23 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-434.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote Fedora host is missing a security update. File : fedora_2015-9456.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3284.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3285.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3286.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote Fedora host is missing a security update. File : fedora_2015-9466.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-1088.nasl - Type : ACT_GATHER_INFO |
2015-06-15 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1045-1.nasl - Type : ACT_GATHER_INFO |
2015-06-12 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1042-1.nasl - Type : ACT_GATHER_INFO |
2015-06-12 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0068.nasl - Type : ACT_GATHER_INFO |
2015-06-12 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0067.nasl - Type : ACT_GATHER_INFO |
2015-06-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2630-1.nasl - Type : ACT_GATHER_INFO |
2015-06-11 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150610_qemu_kvm_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-06-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-1087.nasl - Type : ACT_GATHER_INFO |
2015-06-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-1087.nasl - Type : ACT_GATHER_INFO |
2015-06-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-1087.nasl - Type : ACT_GATHER_INFO |
2015-06-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0063.nasl - Type : ACT_GATHER_INFO |
2015-06-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0064.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-06-16 13:28:22 |
|
2015-06-15 21:30:59 |
|
2015-06-13 17:24:24 |
|