CentOS 5 : xen (CESA-2007:0323)

high Nessus Plugin ID 43639

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

An updated Xen package to fix multiple security issues is now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The Xen package contains the tools for managing the virtual machine monitor in Red Hat Enterprise Linux virtualization.

The following security flaws are fixed in the updated Xen package :

Joris van Rantwijk found a flaw in the Pygrub utility which is used as a boot loader for guest domains. A malicious local administrator of a guest domain could create a carefully crafted grub.conf file which would trigger the execution of arbitrary code outside of that domain.
(CVE-2007-4993)

Tavis Ormandy discovered a heap overflow flaw during video-to-video copy operations in the Cirrus VGA extension code used in Xen. A malicious local administrator of a guest domain could potentially trigger this flaw and execute arbitrary code outside of the domain.
(CVE-2007-1320)

Tavis Ormandy discovered insufficient input validation leading to a heap overflow in the Xen NE2000 network driver. If the driver is in use, a malicious local administrator of a guest domain could potentially trigger this flaw and execute arbitrary code outside of the domain. Xen does not use this driver by default. (CVE-2007-1321)

Users of Xen should update to these erratum packages containing backported patches which correct these issues.

Solution

Update the affected xen packages.

See Also

http://www.nessus.org/u?d84a816b

http://www.nessus.org/u?1de8b6aa

Plugin Details

Severity: High

ID: 43639

File Name: centos_RHSA-2007-0323.nasl

Version: 1.16

Type: local

Agent: unix

Published: 1/6/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:xen-libs, p-cpe:/a:centos:centos:xen-devel, cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:xen

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/3/2007

Vulnerability Publication Date: 5/2/2007

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-1320, CVE-2007-1321, CVE-2007-4993

BID: 23731

CWE: 119, 189, 20

RHSA: 2007:0323