Debian update for xen



Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2018-12891
CVE-2018-12892
CVE-2018-12893
CWE-ID CWE-264
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Debian Linux
Operating systems & Components / Operating system

Vendor Debian

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Denial of service

EUVDB-ID: #VU13520

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-12891

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The vulnerability exists on x86 systems due to unspecified flaw. An adjacent attacker can invoke certain PV MMU operations to preempt the current vCPU, prevent use of a physical CPU and cause the system to crash.

Mitigation

Update the affected package to version: 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4236


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Security restrictions bypass

EUVDB-ID: #VU13522

Risk: Low

CVSSv4.0: 2 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:U/U:Clear]

CVE-ID: CVE-2018-12892

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker with administrative privileges to bypass security restrictions on the target system.

The vulnerability exists on x86 systems due to a flaw in libxl. An adjacent attacker can bypass the read-only restrictions on a SCSI disk image in certain cases.

Mitigation

Update the affected package to version: 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4236


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Denial of service

EUVDB-ID: #VU13521

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-12893

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The vulnerability exists on x86 systems due to unspecified flaw. An adjacent attacker can invoke hardware debugging facilities, trigger a debug exception and cause the system to crash.

Mitigation

Update the affected package to version: 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2018/dsa-4236


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###