Citrix XenServer multiple vulnerabilities (CTX222565)

high Nessus Plugin ID 99377
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

A server virtualization platform installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Citrix XenServer installed on the remote host is missing a security hotfix. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists when invoking the instruction emulator that is triggered during the handling of SYSCALL by single-stepping applications. A local attacker can exploit this to execute code with elevated privileges on the guest. (CVE-2016-10013)

- An out-of-array memory access error exists in the memory_exchange() function within file common/memory.c due to improper checking of XENMEM_exchange input. An attacker on a 64-bit PV guest VM who has administrative privileges can exploit this issue to access arbitrary system memory locations, which can then be potentially used for further compromising the host. (CVE-2017-7228)

- A memory leak issue exits due to improper cleanup being performed during guest destruction. An attacker on the guest can exploit this, by repeatedly rebooting, to exhaust memory on the host system, resulting in a denial of service condition.

Solution

Apply the appropriate hotfix according to the vendor advisory.

See Also

https://support.citrix.com/article/CTX222565

Plugin Details

Severity: High

ID: 99377

File Name: citrix_xenserver_CTX222565.nasl

Version: 1.9

Type: local

Family: Misc.

Published: 4/14/2017

Updated: 1/2/2019

Dependencies: citrix_xenserver_version.nbin

Configuration: Enable paranoid mode

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/XenServer/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/5/2017

Vulnerability Publication Date: 12/19/2016

Reference Information

CVE: CVE-2016-10013, CVE-2017-7228

BID: 97375, 94963