Citrix XenServer Multiple Security Updates (CTX220771)

Published: 2017-02-22 13:10:53
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Detection Method:
Check the installed hotfixes

Recommendations:
Apply the hotfix referenced in the advisory

Summary:
Two security issues have been identified within Citrix XenServer. These issues could, if exploited, allow the administrator of an HVM guest VM to compromise the host. The following vulnerabilities have been addressed: CVE-2017-2615 (High): QEMU: oob access in cirrus bitblt copy CVE-2017-2620 (High): QEMU: cirrus_bitblt_cputovideo does not check if memory region is safe. Customers using only PV guest VMs are not affected by this vulnerability. Customers using only VMs that use the std-vga graphics emulation are not affected by this vulnerability.

Affected Versions:
XenServer 7.0 XenServer 6.5 XenServer 6.2.0 XenServer 6.0.2

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2017-2615
https://nvd.nist.gov/vuln/detail/CVE-2017-2620

CVE Analysis

https://www.mageni.net/cve/CVE-2017-2615
https://www.mageni.net/cve/CVE-2017-2620

References:

https://support.citrix.com/article/CTX220771

Severity
High
CVSS Score
9.0
Published
2017-02-22
Modified
2018-10-19
Category
Citrix Xenserver Local Security Checks

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.