OracleVM 3.4:xen (OVMSA-2018-0221)

high Nessus Plugin ID 109989

概要

遠端 OracleVM 主機缺少一個或多個安全性更新。

說明

遠端 OracleVM 系統缺少可解決重大安全性更新的必要修補程式:

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=5ee0a217664a1fde547afa506e92e4998ed26699

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- Red-tape:使用 CVE XSA-262 更新 repo (Boris Ostrovsky) [Orabug:27948889] (CVE-2018-10981)

- Red-tape:使用 CVE XSA-261 更新 repo (Boris Ostrovsky) [Orabug:27948864] (CVE-2018-10982)

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=a20dadee84429112c3b5f245180f72d990063d20

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/HVM:防止仿真器以奇怪的方式驅動 ioreq 狀態 (Jan Beulich) [Orabug:27948889]

- x86/vpt:添加對 IO-APIC 路由中斷的支援 (Xen Project Security Team) [Orabug:27948864]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=c6b30b4f49430b1314928a4d98a5e9e754895e4d

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- vnuma:即使 vnuma 關閉,仍可以取消設置 smt (Elena Ufimtseva) [Orabug:27950640]

- x86/paging:請勿無條件地尋找 SHARED_M2P_ENTRY 中的錯誤 (Jan Beulich) [Orabug:27965254] (CVE-2017-17565)

- x86/mm:請勿錯誤地設置頁面所有權 (Jan Beulich) [Orabug:27965236] (CVE-2017-17566)

- misc/xenmicrocode:將 /lib/firmware/<some blob> 上傳到管理程序 (Konrad Rzeszutek Wilk) [Orabug:
27957822]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=75ac5267506600d4587b80daae6bb694099e2c03

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/traps:修復管理程序上下文中的#DB 異常處理 (Andrew Cooper) [Orabug:27963989] (CVE-2018-8897)

- x86/traps:將中斷堆棧表用於 #DB (Andrew Cooper) [Orabug:27963989] (CVE-2018-8897)

- x86/pv:將異常注入移至 [,compat_]test_all_events (Andrew Cooper) [Orabug:
27963989] (CVE-2018-8897)

- x86/traps:修復 #DB 處理程序中的 %dr6 處理 (Andrew Cooper) [Orabug:27963989] (CVE-2018-8897)

- x86/traps:set_debugreg 中存在數個錯誤 (Ross Philipson) [Orabug:27963989] (CVE-2018-8897)

- x86/pv:set_debugreg 中存在數個錯誤 (Ross Philipson) [Orabug:27963989] (CVE-2018-8897)

- x86/pv:do_get_debugreg CR4.DE 條件已反轉。(Ross Philipson) [Orabug:27963989] (CVE-2018-8897)

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=d787e7a9d35cc2880b525f1d7a35f27969590f4c

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- vnuma:請勿打開 vcpus 奇數的 smt (Elena Ufimtseva)

解決方案

更新受影響的 xen / xen-tools 套件。

另請參閱

https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000857.html

Plugin 詳細資訊

嚴重性: High

ID: 109989

檔案名稱: oraclevm_OVMSA-2018-0221.nasl

版本: 1.10

類型: local

已發布: 2018/5/23

已更新: 2019/9/27

支援的感應器: Nessus

風險資訊

VPR

風險因素: Critical

分數: 9.6

CVSS v2

風險因素: High

基本分數: 7.2

時間分數: 6.3

媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

風險因素: High

基本分數: 8.8

時間分數: 8.4

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:H/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

必要的 KB 項目: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2018/5/22

弱點發布日期: 2017/12/12

可惡意利用

Metasploit (Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability)

參考資訊

CVE: CVE-2017-17565, CVE-2017-17566, CVE-2018-10981, CVE-2018-10982, CVE-2018-8897