Lucene search

K
openvasCopyright (c) 2012 Greenbone Networks GmbHOPENVAS:881486
HistorySep 07, 2012 - 12:00 a.m.

CentOS Update for qemu-guest-agent CESA-2012:1234 centos6

2012-09-0700:00:00
Copyright (c) 2012 Greenbone Networks GmbH
plugins.openvas.org
7

0.001 Low

EPSS

Percentile

28.5%

Check for the Version of qemu-guest-agent

###############################################################################
# OpenVAS Vulnerability Test
#
# CentOS Update for qemu-guest-agent CESA-2012:1234 centos6 
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "KVM (Kernel-based Virtual Machine) is a full virtualization solution for
  Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space
  component for running virtual machines using KVM.

  A flaw was found in the way QEMU handled VT100 terminal escape sequences
  when emulating certain character devices. A guest user with privileges to
  write to a character device that is emulated on the host using a virtual
  console back-end could use this flaw to crash the qemu-kvm process on the
  host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
  
  This flaw did not affect the default use of KVM. Affected configurations
  were:
  
  * When guests were started from the command line ("/usr/libexec/qemu-kvm")
  without the "-nodefaults" option, and also without specifying a
  serial or parallel device, or a virtio-console device, that specifically
  does not use a virtual console (vc) back-end. (Note that Red Hat does not
  support invoking "qemu-kvm" from the command line without "-nodefaults" on
  Red Hat Enterprise Linux 6.)
  
  * Guests that were managed via libvirt, such as when using Virtual Machine
  Manager (virt-manager), but that have a serial or parallel device, or a
  virtio-console device, that uses a virtual console back-end. By default,
  guests managed via libvirt will not use a virtual console back-end
  for such devices.
  
  Red Hat would like to thank the Xen project for reporting this issue.
  
  All users of qemu-kvm should upgrade to these updated packages, which
  resolve this issue. After installing this update, shut down all running
  virtual machines. Once all virtual machines have shut down, start them
  again for this update to take effect.";

tag_affected = "qemu-guest-agent on CentOS 6";
tag_solution = "Please Install the Updated Packages.";



if(description)
{
  script_xref(name : "URL" , value : "http://lists.centos.org/pipermail/centos-announce/2012-September/018848.html");
  script_id(881486);
  script_version("$Revision: 8265 $");
  script_tag(name:"last_modification", value:"$Date: 2018-01-01 07:29:23 +0100 (Mon, 01 Jan 2018) $");
  script_tag(name:"creation_date", value:"2012-09-07 11:26:05 +0530 (Fri, 07 Sep 2012)");
  script_cve_id("CVE-2012-3515");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_xref(name: "CESA", value: "2012:1234");
  script_name("CentOS Update for qemu-guest-agent CESA-2012:1234 centos6 ");

  script_tag(name: "summary" , value: "Check for the Version of qemu-guest-agent");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
  script_family("CentOS Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/centos", "ssh/login/rpms");
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-rpm.inc");

release = get_kb_item("ssh/login/release");

res = "";
if(release == NULL){
  exit(0);
}

if(release == "CentOS6")
{

  if ((res = isrpmvuln(pkg:"qemu-guest-agent", rpm:"qemu-guest-agent~0.12.1.2~2.295.el6_3.2", rls:"CentOS6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"qemu-img", rpm:"qemu-img~0.12.1.2~2.295.el6_3.2", rls:"CentOS6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"qemu-kvm", rpm:"qemu-kvm~0.12.1.2~2.295.el6_3.2", rls:"CentOS6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"qemu-kvm-tools", rpm:"qemu-kvm-tools~0.12.1.2~2.295.el6_3.2", rls:"CentOS6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}