This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Xen hypervisor installation is missing a security update.
According to its self-reported version number, the Xen hypervisor
installed on the remote host is affected by multiple vulnerabilities :
- A flaw exists in the alloc_heap_pages() function due to
improper handling when 'node >= MAX_NUMNODES'. A guest
attacker can use crafted hypercalls to execute arbitrary
code on the host system. (CVE-2017-14316)
- A double-free flaw exists in the domain_cleanup()
function within 'xenstored_domain.c'. A local attacker
can use this flaw to crash the xenstored daemon which
potentially could cause a denial of service.
- A null pointer dereference flaw exists in the
__gnttab_cache_flush() function. An attacker could
potentially leverage this flaw to crash the host system
from a guest system. (CVE-2017-14318)
- A flaw exists within 'arch/x86/mm.c'. An attacker could
leverage this vulnerability to gain elevated privileges
on the host system from a guest system. (CVE-2017-14319)
Note that Nessus has checked the changeset versions based on the
xen.git change log. Nessus did not check guest hardware configurations
or if patches were applied manually to the source code before a
recompile and reinstall.
See also :
Apply the appropriate patch according to the vendor advisory.
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 6.7
Public Exploit Available : false