Virtuozzo 7 : readykernel-patch (VZA-2017-062)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Virtuozzo host is missing a security update.

Description :

According to the version of the vzkernel package and the
readykernel-patch installed, the Virtuozzo installation on the remote
host is affected by the following vulnerabilities :

- The NFSv4 server in the Linux kernel compiled with
CONFIG_NFSD_PNFS enabled does not properly validate
layout type when processing NFSv4 pNFS LAYOUTGET and
GETDEVICEINFO operands. The attack payload fits to
single one-way UDP packet. The provided input value is
used for array dereferencing. This may lead to a remote
DoS of [knfsd] and so to a soft-lockup of a whole
system.

- A vulnerability was found in the implementation of
setsockopt() operations in the Linux kernel. A
privileged user inside a container could cause a DoS
attack on the host (kernel deadlock in ip_ra_control()
function) using a specially crafted sequence of system
calls.

Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.

See also :

https://help.virtuozzo.com/customer/portal/articles/2835401
http://www.nessus.org/u?858fd78c
http://www.nessus.org/u?7ef02dd1
http://www.nessus.org/u?f55bb5c8

Solution :

Update the readykernel patch.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Virtuozzo Local Security Checks

Nessus Plugin ID: 101233 ()

Bugtraq ID:

CVE ID: CVE-2017-8797

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now