SynopsisThe remote Xen hypervisor installation is missing a security update.
DescriptionAccording to its self-reported version number, the Xen hypervisor installed on the remote host is affected by multiple vulnerabilities :
- A flaw exists in the alloc_heap_pages() function due to improper handling when 'node >= MAX_NUMNODES'. A guest attacker can use crafted hypercalls to execute arbitrary code on the host system. (CVE-2017-14316)
- A double-free flaw exists in the domain_cleanup() function within 'xenstored_domain.c'. A local attacker can use this flaw to crash the xenstored daemon which potentially could cause a denial of service.
- A null pointer dereference flaw exists in the
__gnttab_cache_flush() function. An attacker could potentially leverage this flaw to crash the host system from a guest system. (CVE-2017-14318)
- A flaw exists within 'arch/x86/mm.c'. An attacker could leverage this vulnerability to gain elevated privileges on the host system from a guest system. (CVE-2017-14319)
Note that Nessus has checked the changeset versions based on the xen.git change log. Nessus did not check guest hardware configurations or if patches were applied manually to the source code before a recompile and reinstall.
SolutionApply the appropriate patch according to the vendor advisory.