Citrix XenServer Multiple Vulnerabilities (CTX212736)

critical Nessus Plugin ID 91352

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The version of Citrix XenServer running on the remote host is affected by multiple vulnerabilities in the bundled versions of OpenSSL and QEMU :

- Multiple flaws exist in the bundled version of OpenSSL in the aesni_cbc_hmac_sha1_cipher() and aesni_cbc_hmac_sha256_cipher() functions that are triggered when the connection uses an AES-CBC cipher and AES-NI is supported by the server. A man-in-the-middle attacker can exploit these issues to conduct a padding oracle attack, resulting in the ability to decrypt the network traffic. (CVE-2016-2107)

- A remote code execution vulnerability exists in the bundled version of OpenSSL in the ASN.1 encoder component due to an underflow condition that occurs when attempting to encode the value zero represented as a negative integer. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code. (CVE-2016-2108)

- An out-of-bounds write error exists in the bundled version of QEMU in the vga_update_memory_access() function that is triggered when access nodes are changed after the register bank has been set. An attacker on the guest can exploit this to execute arbitrary code with the privileges of the host's QEMU process.
(CVE-2016-3710)

- An integer overflow condition exists in the bundled version of QEMU in the vbe_update_vgaregs() function that is triggered when setting certain VGA registers while in VBE mode. An attacker on the guest can exploit this to crash the host's QEMU process.
(CVE-2016-3712)

Solution

Apply the appropriate hotfix as referenced in the vendor advisory.

See Also

https://support.citrix.com/article/CTX212736

Plugin Details

Severity: Critical

ID: 91352

File Name: citrix_xenserver_CTX212736.nasl

Version: 1.9

Type: local

Family: Misc.

Published: 5/27/2016

Updated: 7/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:citrix:xenserver

Required KB Items: Host/XenServer/version, Host/local_checks_enabled

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2016

Vulnerability Publication Date: 5/3/2016

Reference Information

CVE: CVE-2016-2107, CVE-2016-2108, CVE-2016-3710, CVE-2016-3712

BID: 90314, 90316