xen was updated to fix 47 security issues.
These security issues were fixed :
CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s->rx_level value in a savevm image (bsc#864655).
CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function’s return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
CVE-2015-8504: VNC: floating point exception (bsc#958491).
CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
CVE-2015-8613: SCSI: stack-based buffer overflow in megasas_ctrl_get_info (bsc#961358).
CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).
The update package also includes non-security fixes. See advisory for details.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2016:0955-1.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(90396);
script_version("2.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2013-4527", "CVE-2013-4529", "CVE-2013-4530", "CVE-2013-4533", "CVE-2013-4534", "CVE-2013-4537", "CVE-2013-4538", "CVE-2013-4539", "CVE-2014-0222", "CVE-2014-3640", "CVE-2014-3689", "CVE-2014-7815", "CVE-2014-9718", "CVE-2015-1779", "CVE-2015-5278", "CVE-2015-6855", "CVE-2015-7512", "CVE-2015-7549", "CVE-2015-8345", "CVE-2015-8504", "CVE-2015-8550", "CVE-2015-8554", "CVE-2015-8555", "CVE-2015-8558", "CVE-2015-8567", "CVE-2015-8568", "CVE-2015-8613", "CVE-2015-8619", "CVE-2015-8743", "CVE-2015-8744", "CVE-2015-8745", "CVE-2015-8817", "CVE-2015-8818", "CVE-2016-1568", "CVE-2016-1570", "CVE-2016-1571", "CVE-2016-1714", "CVE-2016-1922", "CVE-2016-1981", "CVE-2016-2198", "CVE-2016-2270", "CVE-2016-2271", "CVE-2016-2391", "CVE-2016-2392", "CVE-2016-2538", "CVE-2016-2841");
script_bugtraq_id(67357, 67483, 70237, 70997, 70998, 73303, 73316);
script_name(english:"SUSE SLED11 / SLES11 Security Update : xen (SUSE-SU-2016:0955-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"xen was updated to fix 47 security issues.
These security issues were fixed :
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might
have allowed remote attackers to execute arbitrary code
via vectors related to the number of timers
(bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c
allowed remote attackers to cause a denial of service
and possibly execute arbitrary code via a large log_num
value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed
remote attackers to cause a denial of service or
possibly execute arbitrary code via crafted tx_fifo_head
and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load
function in hw/arm/pxa2xx.c allowed remote attackers to
cause a denial of service or possibly execute arbitrary
code via a crafted s->rx_level value in a savevm image
(bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c
allowed remote attackers to cause a denial of service or
possibly execute arbitrary code via vectors related to
IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in
hw/sd/ssi-sd.c allowed remote attackers to execute
arbitrary code via a crafted arglen value in a savevm
image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the
ssd0323_load function in hw/display/ssd0323.c allowed
remote attackers to cause a denial of service (memory
corruption) or possibly execute arbitrary code via
crafted (1) cmd_len, (2) row, or (3) col values; (4)
row_start and row_end values; or (5) col_star and
col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the
tsc210x_load function in hw/input/tsc210x.c might have
allowed remote attackers to execute arbitrary code via a
crafted (1) precision, (2) nextprecision, (3) function,
or (4) nextfunction value in a savevm image
(bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open
function in block/qcow.c allowed remote attackers to
cause a denial of service (crash) via a large L2 table
in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c
allowed local users to cause a denial of service (NULL
pointer dereference) by sending a udp packet with a
value of 0 in the source port and address, which
triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver
(hw/display/vmware_vga.c) allowed local guest users to
write to qemu memory locations and gain privileges via
unspecified parameters related to rectangle handling
(bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c
allowed remote attackers to cause a denial of service
(crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces
in the IDE functionality had multiple interpretations of
a function's return value, which allowed guest OS users
to cause a host OS denial of service (memory consumption
or infinite loop, and system crash) via a PRDT with zero
complete sectors, related to the bmdma_prepare_buf and
ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed
remote attackers to cause a denial of service (memory
and CPU consumption) via a large (1) websocket payload
or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive()
function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict
the commands accepted by an ATAPI device, which allowed
guest users to cause a denial of service or possibly
have unspecified other impact via certain IDE commands,
as demonstrated by a WIN_READ_NATIVE_MAX command to an
empty drive, which triggers a divide-by-zero error and
instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive
function in hw/net/pcnet.c, when a guest NIC has a
larger MTU, allowed remote attackers to cause a denial
of service (guest OS crash) or execute arbitrary code
via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue
(bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing
command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception
(bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious
about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling
(XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM
initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state
resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage
(bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage
(bsc#959387).
- CVE-2015-8613: SCSI: stack-based buffer overflow in
megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey
routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w
functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation
lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via
assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to
segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to
segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio
port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in
arch/x86/mm.c allowed local PV guests to obtain
sensitive information, cause a denial of service, gain
privileges, or have unspecified other impact via a
crafted page identifier (MFN) to the (1)
MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in
the HYPERVISOR_mmuext_op hypercall or (3) unknown
vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on
non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing
firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write()
(bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and
e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in
ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to
cause a denial of service (host reboot) via vectors
related to multiple mappings of MMIO pages with
different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU,
allowed local HVM guest users to cause a denial of
service (guest crash) via vectors related to a
non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module
lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS
control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control
message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive
(bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple
read issue (bsc#958523).
The update package also includes non-security fixes. See advisory for
details.
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864391"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864655"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864673"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864678"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864682"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864769"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864805"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=864811"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=877642"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=897654"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=901508"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=902737"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=924018"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=928393"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=945404"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=945989"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=954872"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=956829"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=957162"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=957988"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958007"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958009"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958491"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958523"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=958917"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=959005"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=959387"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=959695"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=959928"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960334"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960707"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960725"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960835"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960861"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=960862"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961332"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961358"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=961691"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=962320"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=963782"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=963923"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=964413"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=965315"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=965317"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=967012"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=967013"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=967630"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=967969"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=969121"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=969122"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=969350"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4527/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4529/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4530/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4533/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4534/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4537/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4538/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2013-4539/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-0222/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-3640/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-3689/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-7815/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2014-9718/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-1779/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-5278/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-6855/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7512/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-7549/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8345/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8504/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8550/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8554/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8555/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8558/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8567/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8568/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8613/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8619/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8743/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8744/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8745/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8817/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2015-8818/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1568/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1570/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1571/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1714/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1922/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-1981/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2198/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2270/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2271/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2391/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2392/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2538/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2016-2841/"
);
# https://www.suse.com/support/update/announcement/2016/suse-su-20160955-1/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?2a2bba1e"
);
script_set_attribute(
attribute:"solution",
value:
"To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Software Development Kit 11-SP4 :
zypper in -t patch sdksp4-xen-12492=1
SUSE Linux Enterprise Server 11-SP4 :
zypper in -t patch slessp4-xen-12492=1
SUSE Linux Enterprise Desktop 11-SP4 :
zypper in -t patch sledsp4-xen-12492=1
SUSE Linux Enterprise Debuginfo 11-SP4 :
zypper in -t patch dbgsp4-xen-12492=1
To bring your system up-to-date, use 'zypper patch'."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-doc-html");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-kmp-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:xen-tools-domU");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/11/04");
script_set_attribute(attribute:"patch_publication_date", value:"2016/04/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/04/07");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED11|SLES11)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED11 / SLES11", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
if (cpu >!< "i386|i486|i586|i686|x86_64") audit(AUDIT_ARCH_NOT, "i386 / i486 / i586 / i686 / x86_64", cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES11" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLES11 SP4", os_ver + " SP" + sp);
if (os_ver == "SLED11" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLED11 SP4", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-kmp-default-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-libs-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-tools-domU-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-doc-html-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-libs-32bit-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-tools-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"xen-kmp-pae-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-kmp-default-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-libs-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-tools-domU-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"i586", reference:"xen-kmp-pae-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-kmp-default-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-libs-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-tools-domU-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-doc-html-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-libs-32bit-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-tools-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"xen-kmp-pae-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"xen-kmp-default-4.4.4_02_3.0.101_68-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"xen-libs-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"xen-tools-domU-4.4.4_02-32.1")) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"xen-kmp-pae-4.4.4_02_3.0.101_68-32.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xen");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841
www.nessus.org/u?2a2bba1e
bugzilla.suse.com/show_bug.cgi?id=864391
bugzilla.suse.com/show_bug.cgi?id=864655
bugzilla.suse.com/show_bug.cgi?id=864673
bugzilla.suse.com/show_bug.cgi?id=864678
bugzilla.suse.com/show_bug.cgi?id=864682
bugzilla.suse.com/show_bug.cgi?id=864769
bugzilla.suse.com/show_bug.cgi?id=864805
bugzilla.suse.com/show_bug.cgi?id=864811
bugzilla.suse.com/show_bug.cgi?id=877642
bugzilla.suse.com/show_bug.cgi?id=897654
bugzilla.suse.com/show_bug.cgi?id=901508
bugzilla.suse.com/show_bug.cgi?id=902737
bugzilla.suse.com/show_bug.cgi?id=924018
bugzilla.suse.com/show_bug.cgi?id=928393
bugzilla.suse.com/show_bug.cgi?id=945404
bugzilla.suse.com/show_bug.cgi?id=945989
bugzilla.suse.com/show_bug.cgi?id=954872
bugzilla.suse.com/show_bug.cgi?id=956829
bugzilla.suse.com/show_bug.cgi?id=957162
bugzilla.suse.com/show_bug.cgi?id=957988
bugzilla.suse.com/show_bug.cgi?id=958007
bugzilla.suse.com/show_bug.cgi?id=958009
bugzilla.suse.com/show_bug.cgi?id=958491
bugzilla.suse.com/show_bug.cgi?id=958523
bugzilla.suse.com/show_bug.cgi?id=958917
bugzilla.suse.com/show_bug.cgi?id=959005
bugzilla.suse.com/show_bug.cgi?id=959387
bugzilla.suse.com/show_bug.cgi?id=959695
bugzilla.suse.com/show_bug.cgi?id=959928
bugzilla.suse.com/show_bug.cgi?id=960334
bugzilla.suse.com/show_bug.cgi?id=960707
bugzilla.suse.com/show_bug.cgi?id=960725
bugzilla.suse.com/show_bug.cgi?id=960835
bugzilla.suse.com/show_bug.cgi?id=960861
bugzilla.suse.com/show_bug.cgi?id=960862
bugzilla.suse.com/show_bug.cgi?id=961332
bugzilla.suse.com/show_bug.cgi?id=961358
bugzilla.suse.com/show_bug.cgi?id=961691
bugzilla.suse.com/show_bug.cgi?id=962320
bugzilla.suse.com/show_bug.cgi?id=963782
bugzilla.suse.com/show_bug.cgi?id=963923
bugzilla.suse.com/show_bug.cgi?id=964413
bugzilla.suse.com/show_bug.cgi?id=965315
bugzilla.suse.com/show_bug.cgi?id=965317
bugzilla.suse.com/show_bug.cgi?id=967012
bugzilla.suse.com/show_bug.cgi?id=967013
bugzilla.suse.com/show_bug.cgi?id=967630
bugzilla.suse.com/show_bug.cgi?id=967969
bugzilla.suse.com/show_bug.cgi?id=969121
bugzilla.suse.com/show_bug.cgi?id=969122
bugzilla.suse.com/show_bug.cgi?id=969350
www.suse.com/security/cve/CVE-2013-4527/
www.suse.com/security/cve/CVE-2013-4529/
www.suse.com/security/cve/CVE-2013-4530/
www.suse.com/security/cve/CVE-2013-4533/
www.suse.com/security/cve/CVE-2013-4534/
www.suse.com/security/cve/CVE-2013-4537/
www.suse.com/security/cve/CVE-2013-4538/
www.suse.com/security/cve/CVE-2013-4539/
www.suse.com/security/cve/CVE-2014-0222/
www.suse.com/security/cve/CVE-2014-3640/
www.suse.com/security/cve/CVE-2014-3689/
www.suse.com/security/cve/CVE-2014-7815/
www.suse.com/security/cve/CVE-2014-9718/
www.suse.com/security/cve/CVE-2015-1779/
www.suse.com/security/cve/CVE-2015-5278/
www.suse.com/security/cve/CVE-2015-6855/
www.suse.com/security/cve/CVE-2015-7512/
www.suse.com/security/cve/CVE-2015-7549/
www.suse.com/security/cve/CVE-2015-8345/
www.suse.com/security/cve/CVE-2015-8504/
www.suse.com/security/cve/CVE-2015-8550/
www.suse.com/security/cve/CVE-2015-8554/
www.suse.com/security/cve/CVE-2015-8555/
www.suse.com/security/cve/CVE-2015-8558/
www.suse.com/security/cve/CVE-2015-8567/
www.suse.com/security/cve/CVE-2015-8568/
www.suse.com/security/cve/CVE-2015-8613/
www.suse.com/security/cve/CVE-2015-8619/
www.suse.com/security/cve/CVE-2015-8743/
www.suse.com/security/cve/CVE-2015-8744/
www.suse.com/security/cve/CVE-2015-8745/
www.suse.com/security/cve/CVE-2015-8817/
www.suse.com/security/cve/CVE-2015-8818/
www.suse.com/security/cve/CVE-2016-1568/
www.suse.com/security/cve/CVE-2016-1570/
www.suse.com/security/cve/CVE-2016-1571/
www.suse.com/security/cve/CVE-2016-1714/
www.suse.com/security/cve/CVE-2016-1922/
www.suse.com/security/cve/CVE-2016-1981/
www.suse.com/security/cve/CVE-2016-2198/
www.suse.com/security/cve/CVE-2016-2270/
www.suse.com/security/cve/CVE-2016-2271/
www.suse.com/security/cve/CVE-2016-2391/
www.suse.com/security/cve/CVE-2016-2392/
www.suse.com/security/cve/CVE-2016-2538/
www.suse.com/security/cve/CVE-2016-2841/