Citrix XenServer Multiple Security Updates (CTX223291)

Published: 2017-06-28 03:07:10
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Linux Distribution Package

Solution Type:
Vendor Patch

Summary:
A number of security issues have been identified within Citrix XenServer. These issues could, if exploited, allow a malicious administrator of a PV guest VM to compromise the host. The issues have the identifiers: - CVE-2017-8903 (High): x86: 64bit PV guest breakout via pagetable use-after-mode-change - CVE-2017-8904 (High): grant transfer allows PV guest to elevate privileges - CVE-2017-8905 (Low): possible memory corruption via failsafe callback

Detection Method:
Check the installed hotfixes.

Affected Versions:
XenServer versions 7.1, 7.0, 6.5, 6.2.0, 6.0.2.

Recommendations:
Apply the hotfix referenced in the advisory.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2017-8903
https://nvd.nist.gov/vuln/detail/CVE-2017-8904
https://nvd.nist.gov/vuln/detail/CVE-2017-8905

References:

https://support.citrix.com/article/CTX223291

Severity
High
CVSS Score
7.2

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.