Oracle Linux 5 : xen (ELSA-2012-0370)

high Nessus Plugin ID 68493

Synopsis

The remote Oracle Linux host is missing a security update.

Description

The remote Oracle Linux 5 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2012-0370 advisory.

- Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets. (CVE-2012-0029)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected xen, xen-devel and / or xen-libs packages.

See Also

https://linux.oracle.com/errata/ELSA-2012-0370.html

Plugin Details

Severity: High

ID: 68493

File Name: oraclelinux_ELSA-2012-0370.nasl

Version: 1.8

Type: local

Agent: unix

Published: 7/12/2013

Updated: 1/16/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.4

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:M/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2012-0029

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:xen, p-cpe:/a:oracle:linux:xen-devel, p-cpe:/a:oracle:linux:xen-libs, cpe:/o:oracle:linux:5

Required KB Items: Host/RedHat/rpm-list, Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release

Exploit Ease: No known exploits are available

Patch Publication Date: 3/8/2012

Vulnerability Publication Date: 1/27/2012

Reference Information

CVE: CVE-2012-0029

BID: 51642

RHSA: 2012:0370