Xen Project Local Security Bypass Vulnerability (XSA-266)

Low Nessus Plugin ID 111381

Synopsis

The remote Xen hypervisor installation is missing a security update.

Description

According to its self-reported version number, the Xen hypervisor installed on the remote host is affected by a local security bypass vulnerability.

Note that Nessus has checked the changeset versions based on the xen.git change log. Nessus did not check guest hardware configurations or if patches were applied manually to the source code before a recompile and reinstall.

Solution

Apply the appropriate patch according to the vendor advisory.

See Also

http://xenbits.xen.org/xsa/advisory-266.html

https://xenbits.xen.org/gitweb/?p=xen.git;a=summary

Plugin Details

Severity: Low

ID: 111381

File Name: xen_server_XSA-266.nasl

Version: 1.2

Type: local

Family: Misc.

Published: 2018/07/27

Modified: 2018/09/17

Dependencies: 78089

Risk Information

Risk Factor: Low

CVSS Score Source: manual

CVSS Score Rationale: Nvd score unavailable. assigning a score for change from ro to rw on a vhdd (security bypass).

CVSSv2

Base Score: 1.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:N

CVSSv3

Base Score: 4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/o:xen:xen

Required KB Items: installed_sw/Xen Hypervisor, Settings/ParanoidReport

Patch Publication Date: 2018/06/27

Vulnerability Publication Date: 2018/06/27

Reference Information

CVE: CVE-2018-12892

BID: 104571

IAVB: 2018-B-0094