Oracle Linux 5 : xen (ELSA-2015-2065)

high Nessus Plugin ID 86892

Synopsis

The remote Oracle Linux host is missing a security update.

Description

The remote Oracle Linux 5 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2015-2065 advisory.

- Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets. (CVE-2015-5279)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected xen, xen-devel and / or xen-libs packages.

See Also

https://linux.oracle.com/errata/ELSA-2015-2065.html

Plugin Details

Severity: High

ID: 86892

File Name: oraclelinux_ELSA-2015-2065.nasl

Version: 2.8

Type: local

Agent: unix

Published: 11/17/2015

Updated: 1/16/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-5279

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:xen, p-cpe:/a:oracle:linux:xen-devel, p-cpe:/a:oracle:linux:xen-libs, cpe:/o:oracle:linux:5

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/16/2015

Vulnerability Publication Date: 9/28/2015

Reference Information

CVE: CVE-2015-5279

RHSA: 2015:2065