Virtuozzo 7 : readykernel-patch (VZA-2017-004)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Virtuozzo host is missing a security update.

Description :

According to the version of the vzkernel package and the
readykernel-patch installed, the Virtuozzo installation on the remote
host is affected by the following vulnerabilities :

- Linux kernel built with the Kernel-based Virtual
Machine (CONFIG_KVM) support is vulnerable to an
incorrect segment selector(SS) value error. The error
could occur while loading values into the SS register
in long mode. A user/process inside guest could use
this flaw to crash the guest resulting in DoS or
potentially escalate their privileges inside guest.

- arch/x86/kvm/emulate.c in the Linux kernel through
4.9.3 allows local users to obtain sensitive
information from kernel memory or cause a denial of
service (use-after-free) via a crafted application that
leverages instruction emulation for fxrstor, fxsave,
sgdt, and sidt.

Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.

See also :

https://help.virtuozzo.com/customer/portal/articles/2734643
http://www.nessus.org/u?84a60371
http://www.nessus.org/u?2dca61ae
http://www.nessus.org/u?7af5a350

Solution :

Update the readykernel patch.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Virtuozzo Local Security Checks

Nessus Plugin ID: 97976 ()

Bugtraq ID:

CVE ID: CVE-2017-2583
CVE-2017-2584

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now