Debian DSA-1384-1 : xen-utils - several vulnerabilities

high Nessus Plugin ID 26931

Synopsis

The remote Debian host is missing a security-related update.

Description

Several local vulnerabilities have been discovered in the Xen hypervisor packages which may lead to the execution of arbitrary code.
The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2007-4993 By use of a specially crafted grub configuration file a domU user may be able to execute arbitrary code upon the dom0 when pygrub is being used.

- CVE-2007-1320 Multiple heap-based buffer overflows in the Cirrus VGA extension, provided by QEMU, may allow local users to execute arbitrary code via 'bitblt' heap overflow.

Solution

Upgrade the xen-utils package.

For the stable distribution (etch), these problems have been fixed in version 3.0.3-0-3.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444430

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444007

https://security-tracker.debian.org/tracker/CVE-2007-4993

https://security-tracker.debian.org/tracker/CVE-2007-1320

https://www.debian.org/security/2007/dsa-1384

Plugin Details

Severity: High

ID: 26931

File Name: debian_DSA-1384.nasl

Version: 1.18

Type: local

Agent: unix

Published: 10/9/2007

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:xen-utils, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/5/2007

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-1320, CVE-2007-4993

CWE: 119, 20

DSA: 1384