OracleVM 3.2 : xen (OVMSA-2016-0172)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- qemu: ioport_read, ioport_write: be defensive about
32-bit addresses On x86, ioport addresses are 16-bit.
That these functions take 32-bit arguments is a mistake.
Changing the argument type to 16-bit will discard the
top bits of any erroneous values from elsewhere in qemu.
Also, check just before use that the value is in range.
(This turns an ill-advised change to MAX_IOPORTS into a
possible guest crash rather than a privilege escalation
vulnerability.) And, in the Xen ioreq processor, clamp
incoming ioport addresses to 16-bit values. Xen will
never write >16-bit values but the guest may have access
to the ioreq ring. We want to defend the rest of the
qemu code from wrong values. This is XSA-199.
(CVE-2016-9637)

See also :

http://www.nessus.org/u?559639b9

Solution :

Update the affected xen / xen-devel / xen-tools packages.

Risk factor :

Low / CVSS Base Score : 3.7
(CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 2.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: OracleVM Local Security Checks

Nessus Plugin ID: 95619 ()

Bugtraq ID:

CVE ID: CVE-2016-9637

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now