Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2017-019)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Virtuozzo host is missing a security update.

Description :

According to the version of the parallels-server-bm-release /
vzkernel / etc packages installed, the Virtuozzo installation on the
remote host is affected by the following vulnerability :

- A flaw was discovered in the Linux kernel's key
subsystem. Invoking the request_key() system call with
a specially crafted set of arguments could result in a
NULL-pointer dereference inside the search_keyring()
function. A local unprivileged user could use this
vulnerability to crash the system. The vulnerability
could be exploited from inside containers.

Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.

See also :

https://help.virtuozzo.com/customer/portal/articles/2770047
https://bugzilla.redhat.com/show_bug.cgi?id=1427994

Solution :

Update the affected parallels-server-bm-release / vzkernel / etc package.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Virtuozzo Local Security Checks

Nessus Plugin ID: 97986 ()

Bugtraq ID:

CVE ID: CVE-2017-2647

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now