This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
An updated Xen package to fix one security issue and two bugs is now
available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
The Xen package contains the tools for managing the virtual machine
monitor in Red Hat Enterprise Linux virtualization.
A flaw was found affecting the VNC server code in QEMU. On a
fullyvirtualized guest VM, where qemu monitor mode is enabled, a user
who had access to the VNC server could gain the ability to read
arbitrary files as root in the host filesystem. (CVE-2007-0998)
In addition to disabling qemu monitor mode, the following bugs were
also fixed :
* Fix IA64 fully virtualized (VTi) shadow page table mode
* Fix network bonding in balanced-rr mode. Without this update, a
network path loss could result in packet loss.
Users of Xen should update to these erratum packages containing
backported patches which correct these issues.
See also :
Update the affected xen, xen-devel and / or xen-libs packages.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 25321 ()
Bugtraq ID: 22967
CVE ID: CVE-2007-0998
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.