RHEL 5 : xen (RHSA-2016:2963)

Low Nessus Plugin ID 95982


The remote Red Hat host is missing one or more security updates.


An update for xen is now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Xen is a virtual machine monitor

Security Fix(es) :

* An out of bounds array access issue was found in the Xen virtual machine monitor, built with the QEMU ioport support. It could occur while doing ioport read/write operations, if guest was to supply a 32bit address parameter. A privileged guest user/process could use this flaw to potentially escalate their privileges on a host.

Red Hat would like to thank the Xen project for reporting this issue.


Update the affected packages.

See Also



Plugin Details

Severity: Low

ID: 95982

File Name: redhat-RHSA-2016-2963.nasl

Version: $Revision: 3.5 $

Type: local

Agent: unix

Published: 2016/12/21

Modified: 2017/03/06

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 3.7

Temporal Score: 2.7

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 7.5

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xen, p-cpe:/a:redhat:enterprise_linux:xen-debuginfo, p-cpe:/a:redhat:enterprise_linux:xen-devel, p-cpe:/a:redhat:enterprise_linux:xen-libs, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/12/20

Reference Information

CVE: CVE-2016-9637

OSVDB: 148308

RHSA: 2016:2963