Xen Project Speculative Execution Side Channel Vulnerability (XSA-273) (Foreshadow)

Medium Nessus Plugin ID 112159


The remote Xen hypervisor installation is missing a security update.


According to its self-reported version number, the Xen hypervisor
installed on the remote host is affected by a speculative execution
side channel attack known as L1 Terminal Fault (L1TF). An attacker
who successfully exploited L1TF may be able to read privileged data
across trust boundaries.

Note that Nessus has checked the changeset versions based on the
xen.git change log. Nessus did not check guest hardware configurations
or if patches were applied manually to the source code before a
recompile and reinstall.


Apply the appropriate patch according to the vendor advisory.

See Also



Plugin Details

Severity: Medium

ID: 112159

File Name: xen_server_XSA-273.nasl

Version: 1.4

Type: local

Family: Misc.

Published: 2018/08/28

Modified: 2018/12/07

Dependencies: 78089

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-3620

CVSS v2.0

Base Score: 4.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS v3.0

Base Score: 5.6

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Vulnerability Information

CPE: cpe:/o:xen:xen

Patch Publication Date: 2018/08/14

Vulnerability Publication Date: 2018/08/14

Reference Information

CVE: CVE-2018-3620, CVE-2018-3646

BID: 105080

IAVB: 2018-B-0111