openSUSE Security Update : kvm (kvm-412)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Rogue VNC clients could make the built in VNC server of kvm run into
an infinite loop (CVE-2008-2382)

An off-by-one bug limited the length of VNC passwords to seven instead
of eight (CVE-2008-5714)

Virtualized guests could potentially execute code on the host by
triggering a buffer overflow in the network emulation code via large
ethernet frames (CVE-2007-5729)

Virtualized guests could potentially execute code on the host by
triggering a heap based buffer overflow in the Cirrus Graphics card
emulation (CVE-2007-1320).

See also :

https://bugzilla.novell.com/show_bug.cgi?id=252519
https://bugzilla.novell.com/show_bug.cgi?id=448551
https://bugzilla.novell.com/show_bug.cgi?id=464141
https://bugzilla.novell.com/show_bug.cgi?id=464142

Solution :

Update the affected kvm package.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)

Family: SuSE Local Security Checks

Nessus Plugin ID: 40254 ()

Bugtraq ID:

CVE ID: CVE-2007-1320
CVE-2007-5729
CVE-2008-2382
CVE-2008-5714

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now