Virtuozzo 7 : readykernel-patch (VZA-2018-014)

medium Nessus Plugin ID 108565

Synopsis

The remote Virtuozzo host is missing a security update.

Description

According to the version of the vzkernel package and the readykernel-patch installed, the Virtuozzo installation on the remote host is affected by the following vulnerability :

- It was discovered that the implementation of ebtables in the kernel did not properly validate the offsets received from the user space. A local user with enough privileges in the user and network namespaces could use that to trigger an out-of-bounds write to the kernel address space.

Note that Tenable Network Security has extracted the preceding description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the readykernel patch.

See Also

https://help.virtuozzo.com/customer/portal/articles/2930228

http://www.nessus.org/u?2dc07dab

http://www.nessus.org/u?18933207

http://www.nessus.org/u?b5c1857a

http://www.nessus.org/u?4feab386

http://www.nessus.org/u?65fc95aa

http://www.nessus.org/u?4c2416c5

http://www.nessus.org/u?0cd60039

Plugin Details

Severity: Medium

ID: 108565

File Name: Virtuozzo_VZA-2018-014.nasl

Version: 1.7

Type: local

Published: 3/23/2018

Updated: 12/10/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-1068

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:virtuozzo:virtuozzo:7, p-cpe:/a:virtuozzo:virtuozzo:readykernel

Required KB Items: Host/local_checks_enabled, Host/Virtuozzo/release, Host/Virtuozzo/rpm-list, Host/readykernel-info

Exploit Ease: No known exploits are available

Patch Publication Date: 3/22/2018

Reference Information

CVE: CVE-2018-1068