Executive Summary

Summary
Title xen security update
Informations
Name DSA-4131 First vendor Publication 2018-03-04
Vendor Debian Last vendor Modification 2018-03-04
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:C)
Cvss Base Score 6.1 Attack Range Local
Cvss Impact Score 8.5 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities have been discovered in the Xen hypervisor:

CVE-2018-7540

Jann Horn discovered that missing checks in page table freeing may result in denial of service.

CVE-2018-7541

Jan Beulich discovered that incorrect error handling in grant table checks may result in guest-to-host denial of service and potentially privilege escalation.

CVE-2018-7542

Ian Jackson discovered that insufficient handling of x86 PVH guests without local APICs may result in guest-to-host denial of service.

For the stable distribution (stretch), these problems have been fixed in version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5.

We recommend that you upgrade your xen packages.

For the detailed security status of xen please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xen

Original Source

Url : http://www.debian.org/security/2018/dsa-4131

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-476 NULL Pointer Dereference
50 % CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 17
Os 1
Os 153

Snort® IPS/IDS

Date Description
2019-09-24 OMRON CX-One MCI file stack buffer overflow attempt
RuleID : 51192 - Revision : 1 - Type : FILE-OTHER
2019-09-24 OMRON CX-One MCI file stack buffer overflow attempt
RuleID : 51191 - Revision : 1 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2018-11-13 Name : The remote Debian host is missing a security update.
File : debian_DLA-1577.nasl - Type : ACT_GATHER_INFO
2018-10-31 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201810-06.nasl - Type : ACT_GATHER_INFO
2018-04-06 Name : A server virtualization platform installed on the remote host is affected by ...
File : citrix_xenserver_CTX232096.nasl - Type : ACT_GATHER_INFO
2018-04-06 Name : A server virtualization platform installed on the remote host is affected by ...
File : citrix_xenserver_CTX232655.nasl - Type : ACT_GATHER_INFO
2018-03-21 Name : The remote Fedora host is missing a security update.
File : fedora_2018-0746dac335.nasl - Type : ACT_GATHER_INFO
2018-03-07 Name : The remote Fedora host is missing a security update.
File : fedora_2018-c553a586c8.nasl - Type : ACT_GATHER_INFO
2018-03-06 Name : The remote Debian host is missing a security update.
File : debian_DLA-1300.nasl - Type : ACT_GATHER_INFO
2018-03-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4131.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2018-03-17 09:21:18
  • Multiple Updates
2018-03-17 00:21:25
  • Multiple Updates
2018-03-04 13:19:19
  • First insertion