EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2019-2468)

Medium Nessus Plugin ID 131621

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the libvirt packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

- Microarchitectural Store Buffer Data Sampling (MSBDS):
Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12126)

- Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2019-11091)

- Microarchitectural Fill Buffer Data Sampling (MFBDS):
Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12130)

- Microarchitectural Load Port Data Sampling (MLPDS):
Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12127)

- An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.(CVE-2019-3886)

- libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.(CVE-2018-1064)

- qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.(CVE-2018-5748)

- Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.(CVE-2018-3639)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected libvirt packages.

See Also

http://www.nessus.org/u?f83b39b1

Plugin Details

Severity: Medium

ID: 131621

File Name: EulerOS_SA-2019-2468.nasl

Version: 1.3

Type: local

Published: 2019/12/04

Updated: 2020/05/07

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-3639

CVSS v2.0

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:libvirt, p-cpe:/a:huawei:euleros:libvirt-client, p-cpe:/a:huawei:euleros:libvirt-daemon, p-cpe:/a:huawei:euleros:libvirt-daemon-config-network, p-cpe:/a:huawei:euleros:libvirt-daemon-config-nwfilter, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-interface, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-lxc, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-network, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nodedev, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nwfilter, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-qemu, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-secret, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage, p-cpe:/a:huawei:euleros:libvirt-daemon-kvm, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2019/12/04

Reference Information

CVE: CVE-2018-1064, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2018-3639, CVE-2018-5748, CVE-2019-11091, CVE-2019-3886