RHEL 7 : virtio-win (RHSA-2015:1044)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated virtio-win package that fixes one security issue and two
bugs is now available for Red Hat Enterprise Linux 7 Supplementary.

Red Hat Product Security has rated this update as having Important
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The virtio-win package provides paravirtualized network drivers for
most Microsoft Windows operating systems. Paravirtualized drivers are
virtualization-aware drivers used by fully virtualized guests running
on Red Hat Enterprise Linux. Fully virtualized guests using the
paravirtualized drivers gain significantly better I/O performance than
fully virtualized guests running without the drivers.

It was found that the Windows Virtio NIC driver did not sufficiently
sanitize the length of the incoming IP packets, as demonstrated by a
packet with IP options present but the overall packet length not being
adjusted to reflect the length of those options. A remote attacker
able to send a specially crafted IP packet to the guest could use this
flaw to crash that guest. (CVE-2015-3215)

Red Hat would like to thank Google Project Zero for reporting this

This update also fixes the following bugs :

* When creating a Windows guest using virtio drivers and direct
Logical Unit Number (LUN) access with more than 4 SCSI disks under one
virtio-scsi-pci controller, the guest terminated unexpectedly with a
stop error, also known as the blue screen of death. This update
increases the maximum amount of LUNs per a single virtio-scsi-pci
controller has been increased to 254, which prevents the described
crash from occurring. (BZ#1207546)

* The license.txt file in the virtio-win build has been updated to
include the correct year number in the copyright information section.

All virtio-win users are advised to upgrade to this updated package,
which contains backported patches to correct these issues.

See also :


Solution :

Update the affected virtio-win package.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 83987 ()

Bugtraq ID: 74968

CVE ID: CVE-2015-3215

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now