RHEL 6 : virtio-win (RHSA-2013:1101)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated virtio-win package that fixes one security issue is now
available for Red Hat Enterprise Linux 6 Supplementary.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System
(CVSS) base score, which gives a detailed severity rating, is
available from the CVE link in the References section.

The virtio-win package provides paravirtualized network drivers for
most Microsoft Windows operating systems. Paravirtualized drivers are
virtualization-aware drivers used by fully virtualized guests running
on Red Hat Enterprise Linux.

An unquoted search path flaw was found in the way the QEMU Guest Agent
service installation was performed on Windows. Depending on the
permissions of the directories in the unquoted search path, a local,
unprivileged user could use this flaw to have a binary of their
choosing executed with SYSTEM privileges. (CVE-2013-2231)

This issue was discovered by Lev Veyde of Red Hat.

Users of virtio-win are advised to upgrade to this updated package,
which corrects this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2013-2231.html
http://rhn.redhat.com/errata/RHSA-2013-1101.html

Solution :

Update the affected virtio-win package.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 69012 ()

Bugtraq ID:

CVE ID: CVE-2013-2231