OracleVM 3.2 : xen (OVMSA-2016-0172)

Low Nessus Plugin ID 95619


The remote OracleVM host is missing one or more security updates.


The remote OracleVM system is missing necessary patches to address critical security updates :

- qemu: ioport_read, ioport_write: be defensive about 32-bit addresses On x86, ioport addresses are 16-bit.
That these functions take 32-bit arguments is a mistake.
Changing the argument type to 16-bit will discard the top bits of any erroneous values from elsewhere in qemu.
Also, check just before use that the value is in range.
(This turns an ill-advised change to MAX_IOPORTS into a possible guest crash rather than a privilege escalation vulnerability.) And, in the Xen ioreq processor, clamp incoming ioport addresses to 16-bit values. Xen will never write >16-bit values but the guest may have access to the ioreq ring. We want to defend the rest of the qemu code from wrong values. This is XSA-199.


Update the affected xen / xen-devel / xen-tools packages.

See Also

Plugin Details

Severity: Low

ID: 95619

File Name: oraclevm_OVMSA-2016-0172.nasl

Version: 3.14

Type: local

Published: 2016/12/08

Updated: 2019/09/27

Dependencies: 12634

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 3.7

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-devel, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.2

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/12/07

Vulnerability Publication Date: 2017/02/17

Reference Information

CVE: CVE-2016-9637