MiracleLinux 3 : xen-3.0.3-64.3.1AXS3 (AXSA:2008-443:02)

high Nessus Plugin ID 284476

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2008-443:02 advisory.

This package contains the Xen tools and management daemons needed to run virtual machines.
Information on how to use Xen can be found at the Xen project pages.
The Xen system also requires the Xen hypervisor and domain-0 kernel, which can be found in the kernel-xen* package.
Virtualization can be used to run multiple operating systems on one physical system, for purposes of hardware consolidation, hardware abstraction, or to test untrusted applications in a sandboxed environment.
Bugs fixed:
CVE-2007-4993 pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
CVE-2007-1321 Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 receive integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled NE2000 network driver and the socket code, but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.
CVE-2007-3919 (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.
CVE-2008-0928 Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
CVE-2007-5730 Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the net socket listen option, aka QEMU net socket heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of NE2000 network driver and the socket code, but this is the correct identifier for the individual net socket listen vulnerability.
CVE-2008-2004 The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.
CVE-2008-1945 QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
CVE-2008-1952 The backend for XenSource Xen Para Virtualized Frame Buffer (PVFB) in Xen ioemu does not properly restrict the frame buffer size, which allows attackers to cause a denial of service (crash) by mapping an arbitrary amount of guest memory.
- rebuild for Asianux 3.0 SP1
- use functions for service script xendomains by default
- Fix PVFB to validate frame buffer description
- Fix PVFB to cope with bogus update requests
- Fix FV O_DIRECT flushing
- Rewrite locking in hotplug scripts to fix timeouts
- Require xen-hypervisor-abi = 3.1 to pull in neccessary kernel
- Fixed memory ballooning for HVM restore
- Avoid bogus VNC password prompts after migrate/restore
- Fix UUID normalization when no UUID is present
- Fix handling of 'keymap' param in config files
- Don't destroy guest after shutdown timeout
- Ensure PVFB daemon terminates promptly on domain shutdown
- Fix rtl8139 checksums for VISTA
- Update package description to better reflect reality
- Fix more VNC threading problems
- Fix save/restore edge case
- Fix legacy PVFB for 32-on-64
- Fixed booting guests with legacy native ABI device protocol
- Fix more VNC keycode/keysym mappings issues
- Fix potential QEMU crash when VNC client disconnects
- Add NVRAM support for ia64 guests
- Normalize UUID to avoid loosing guest name upon restarts
- fix ethernet bonding in balanced-rr mode
- Fix vncport type cast for HVM guests
- Ignore failures in dump core
- Rate limit console messages from guest
- Use -r flag to losetup for readonly block devices
- Mark /etc/sysconfig/xend as a config file
- Fix address test in network-bridge
- Permissions of xend-debug.log
- Hotplug scripts error reporting
- Disable network-bridge if running on Dom0 with nfs/iscsi root device
- Fix a race in the pvfb startup
- Loadable pvfb keymap
- Fix pvfb save/restore broken in 3.0.3-27.el5
- Fixed 32-bit core dumps with HVM
- Add persistent logging of guest & hypervisor console
- Fix destroyDevice() args
- Check file exists in blktap hotplug scripts
- Make SXPR server in XenD multi-threaded
- Fixed xm man page about block device modes
- Update low level (non-XenD) userspace to work with 3.1.0 hypervisor
- Patch XenD to use 'domid' instead of 'dom' with libxc
- Patch XenD to use new HVM domain creation process
- Remove unused i18n stuff from Makefile
- Fix pygrub, blktapctrl paths to return to original settings
- Back-port 3.1.0 HVM save/restore changes to XenD
- Move HVM save/restore files from /tmp to /var/lib/xen
- Ensure pvfb backend terminates when frontend vanishes early
- Save vncpasswd in xenstore along with the other pvfb configuration
- Fix allocation of fixed VNC ports for pvfb
- Don't start a xen-vncfb process for HVM
- disable qemu monitor mode, for security reasons
- fix IA64 shadow page table mode

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected xen, xen-devel and / or xen-libs packages.

See Also

https://tsn.miraclelinux.com/en/node/539

Plugin Details

Severity: High

ID: 284476

File Name: miracle_linux_AXSA-2008-443.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.5

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2007-5730

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:miracle:linux:3, p-cpe:/a:miracle:linux:xen-libs, p-cpe:/a:miracle:linux:xen-devel, p-cpe:/a:miracle:linux:xen

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/1/2008

Vulnerability Publication Date: 5/1/2007

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-1321, CVE-2007-3919, CVE-2007-4993, CVE-2007-5730, CVE-2008-0928, CVE-2008-1945, CVE-2008-1952, CVE-2008-2004