Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Citrix XenServer Multiple Security Updates (CTX200288)

Information

Severity

Severity

High

Family

Family

Citrix Xenserver Local Security Checks

CVSSv2 Base

CVSSv2 Base

8.3

CVSSv2 Vector

CVSSv2 Vector

AV:A/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

9 years ago

Modified

Modified

5 years ago

Summary

A number of security vulnerabilities have been identified in Citrix XenServer. These vulnerabilities could, if exploited, allow unprivileged code in an HVM guest to gain privileged execution within that guest and also allow privileged code within a PV or HVM guest to crash the host or other guests. The following vulnerabilities have been addressed: - CVE-2014-8595: Missing privilege level checks in x86 emulation of far branches - CVE-2014-8866: Excessive checking in compatibility mode hypercall argument translation - CVE-2014-8867: Insufficient bounding of `REP MOVS` to MMIO emulated inside the hypervisor - CVE-2014-1666: PHYSDEVOP_{prepare, release}_msix exposed to unprivileged guests

Affected Software

Affected Software

These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 6.2 Service Pack 1.

Detection Method

Detection Method

Check the installed hotfixes

Solution

Solution

Apply the hotfix referenced in the advisory.

Common Vulnerabilities and Exposures (CVE)