Citrix XenServer Multiple Vulnerabilities (CTX224740)

critical Nessus Plugin ID 101205
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

A server virtualization platform installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Citrix XenServer installed on the remote host is missing a security hotfix. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists that causes grant table operations to fail due to improper handling of reference counts. An unauthenticated, remote attacker can exploit this to have an unspecified impact.

- An information disclosure vulnerability exists due to blkif responses leaking stack data. An unauthenticated, remote attacker can exploit this to disclose potentially sensitive information.

- A NULL pointer dereference flaw exists in the event channel poll that allows an unauthenticated, remote attacker to cause a denial of service condition.

- A flaw exists in shadow emulation due to insufficient reference counts. An unauthenticated, remote attacker can exploit this to have an unspecified impact.

- A race condition exists in the grant table unmap code that allows an unauthenticated, remote attacker to have an unspecified impact.

- An unspecified flaw exists in page transfers that allows a local attacker on the PV guest to gain elevated privileges.

- A flaw exists that is triggered by stale P2M mappings due to insufficient error checking. An unauthenticated, remote attacker can exploit this to have an unspecified impact.

Solution

Apply the appropriate hotfix according to the vendor advisory.

See Also

https://support.citrix.com/article/CTX224740

Plugin Details

Severity: Critical

ID: 101205

File Name: citrix_xenserver_CTX224740.nasl

Version: 1.8

Type: local

Family: Misc.

Published: 7/3/2017

Updated: 4/24/2020

Dependencies: citrix_xenserver_version.nbin

Risk Information

CVSS Score Source: CVE-2017-10921

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:citrix:xenserver

Required KB Items: Host/XenServer/version, Host/local_checks_enabled

Exploit Ease: No known exploits are available

Patch Publication Date: 6/27/2017

Vulnerability Publication Date: 6/27/2017

Reference Information

CVE: CVE-2017-10911, CVE-2017-10912, CVE-2017-10913, CVE-2017-10914, CVE-2017-10915, CVE-2017-10917, CVE-2017-10918, CVE-2017-10920, CVE-2017-10921, CVE-2017-10922

BID: 99157, 99158, 99161, 99162, 99174, 99411, 99435