FreeBSD : xen-kernel -- Information leak through XEN_DOMCTL_gettscinfo (ce658051-27ea-11e5-a4a5-002590263bf5)

low Nessus Plugin ID 84714

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The Xen Project reports :

The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding field subsequently copied to guest memory.

A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being addressed here regardless of that operation being declared unsafe for disaggregation by XSA-77.

Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 may be able to read sensitive data relating to the hypervisor or other guests not under the control of that domain.

Solution

Update the affected package.

See Also

http://xenbits.xen.org/xsa/advisory-132.html

http://www.nessus.org/u?33241320

Plugin Details

Severity: Low

ID: 84714

File Name: freebsd_pkg_ce65805127ea11e5a4a5002590263bf5.nasl

Version: 2.4

Type: local

Published: 7/14/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 2.9

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xen-kernel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/11/2015

Vulnerability Publication Date: 4/20/2015

Reference Information

CVE: CVE-2015-3340