This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Virtuozzo host is missing a security update.
According to the version of the vzkernel package and the
readykernel-patch installed, the Virtuozzo installation on the remote
host is affected by the following vulnerabilities :
- A vulnerability was found in the handling of xfrm
Netlink messages. A privileged user inside a container
could cause a denial of service (kernel crash) by
sending a crafted Netlink message with type
XFRM_MSG_MIGRATE to the kernel.
- Integer overflow vulnerability in ip6_find_1stfragopt()
function was found. Local attacker that has privileges
to open raw sockets can cause infinite loop inside
- Kernel memory corruption due to a buffer overflow was
found in brcmf_cfg80211_mgmt_tx() function in Linux
kernels from v3.9-rc1 to v4.13-rc1. The vulnerability
can be triggered by sending a crafted NL80211_CMD_FRAME
packet via netlink. An unprivileged local user could
use this flaw to induce kernel memory corruption on the
system, leading to a crash.
Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.
See also :
Update the readykernel patch.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false