Citrix XenServer Multiple Vulnerabilities (CTX223291)

high Nessus Plugin ID 100104

Synopsis

A server virtualization platform installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Citrix XenServer running on the remote host is missing a security hotfix. It is, therefore, affected by multiple vulnerabilities :

- An unspecified flaw exists that is triggered when handling grant transfers. An attacker in a guest virtual machine can exploit this to gain elevated privileges on the host.

- A memory corruption issue exists due to improper validation of user-supplied input when handling failsafe callbacks. An attacker in a guest virtual machine can exploit this to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code on the host.

- An unspecified flaw exists when handling use-after-mode-change pagetables. An attacker in a guest virtual machine can exploit this to gain elevated privileges on the host.

Solution

Apply the appropriate hotfix according to the vendor advisory.

See Also

https://support.citrix.com/article/CTX223291

Plugin Details

Severity: High

ID: 100104

File Name: citrix_xenserver_CTX223291.nasl

Version: 1.7

Type: local

Family: Misc.

Published: 5/10/2017

Updated: 1/2/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:citrix:xenserver

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/XenServer/version

Patch Publication Date: 5/2/2017

Vulnerability Publication Date: 5/2/2017