Citrix XenServer Multiple Security Updates (CTX200892)

Published: 2015-04-17 12:24:28
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Detection Method:
Check the installed hotfixes

Recommendations:
Apply the hotfix referenced in the advisory.

Summary:
A number of security vulnerabilities have been identified in Citrix XenServer. These vulnerabilities could, if exploited, allow a malicious administrator of an HVM guest to compromise the host. These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 6.5. The following vulnerabilities have been addressed: - CVE-2014-8106 (High): Heap-based buffer overflow in the Cirrus VGA emulator - CVE-2014-7815 (Low): The set_pixel_format function in QEMU allows a denial of service (crash) - CVE-2014-3615 (Low): The VGA emulator in QEMU allows users to read memory

Affected Versions:
XenServer 6.5 XenServer 6.2.0 XenServer 6.1.0 XenServer 6.0.2 XenServer 6.0

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2014-8106
https://nvd.nist.gov/vuln/detail/CVE-2014-7815
https://nvd.nist.gov/vuln/detail/CVE-2014-3615

CVE Analysis

https://www.mageni.net/cve/CVE-2014-8106
https://www.mageni.net/cve/CVE-2014-7815
https://www.mageni.net/cve/CVE-2014-3615

References:

http://support.citrix.com/article/CTX200892

Severity
Medium
CVSS Score
5.0
Published
2015-04-17
Modified
2018-10-12
Category
Citrix Xenserver Local Security Checks

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.