Citrix XenServer Multiple Vulnerabilities (CTX200892)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The version of Citrix XenServer installed on the remote host is
affected by multiple vulnerabilities :

- A flaw exists in the VGA emulator in QEMU that allows a
local guest user to read host memory by setting the
display to a high resolution. (CVE-2014-3615)

- A flaw exists in the set_pixel_format() function within
ui/vnc.c in QEMU that allows a remote attacker, using
a small bytes_per_pixel value, to cause a denial of
service condition. (CVE-2014-7815)

- A heap-based buffer overflow flaw exists in the Cirrus
VGA emulator that allows local guest users to execute
arbitrary code via vectors related to blit regions.
(CVE-2014-8106)

Note that environments that contain only PV guests are not vulnerable
to these issues.

See also :

https://support.citrix.com/article/CTX200892

Solution :

Apply the relevant hotfix referenced in the vendor advisory.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 83163 ()

Bugtraq ID: 69654
70998
71477

CVE ID: CVE-2014-3615
CVE-2014-7815
CVE-2014-8106

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now