openSUSE Security Update : Xen (openSUSE-SU-2012:0548-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This is a XEN bugfix update fixing lots of bugs and one security
issue.

CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc
function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and
possibly other versions, allows guest OS users to cause a denial of
service (QEMU crash) and possibly execute arbitrary code via crafted
legacy mode packets.

See also :

http://lists.opensuse.org/opensuse-updates/2012-04/msg00055.html
https://bugzilla.novell.com/show_bug.cgi?id=740165
https://bugzilla.novell.com/show_bug.cgi?id=743414
https://bugzilla.novell.com/show_bug.cgi?id=744014
https://bugzilla.novell.com/show_bug.cgi?id=744771
https://bugzilla.novell.com/show_bug.cgi?id=745005
https://bugzilla.novell.com/show_bug.cgi?id=745221
https://bugzilla.novell.com/show_bug.cgi?id=745367
https://bugzilla.novell.com/show_bug.cgi?id=745880
https://bugzilla.novell.com/show_bug.cgi?id=746702
https://bugzilla.novell.com/show_bug.cgi?id=747331
https://bugzilla.novell.com/show_bug.cgi?id=753165
https://features.opensuse.org/310510

Solution :

Update the affected Xen packages.

Risk factor :

High / CVSS Base Score : 7.4
(CVSS2#AV:A/AC:M/Au:S/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 74606 ()

Bugtraq ID:

CVE ID: CVE-2012-0029

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now