Summary
A number of security vulnerabilities have been identified in Citrix XenServer.
These vulnerabilities could, if exploited, allow unprivileged code in an HVM guest to gain privileged execution within that guest and also allow privileged code within a PV or HVM guest to crash the host or other guests.
The following vulnerabilities have been addressed:
- CVE-2014-8595: Missing privilege level checks in x86 emulation of far branches - CVE-2014-8866: Excessive checking in compatibility mode hypercall argument translation - CVE-2014-8867: Insufficient bounding of `REP MOVS` to MMIO emulated inside the hypervisor - CVE-2014-1666: PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests
Solution
Apply the hotfix referenced in the advisory
Affected
These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 6.2 Service Pack 1.
Detection
Check the installed hotfixes
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-1666, CVE-2014-8595, CVE-2014-8866, CVE-2014-8867 -
CVSS Base Score: 8.3
AV:A/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Acrobat Multiple Vulnerabilities -01 Jan 13 (Mac OS X)
- Adobe Acrobat Multiple Unspecified Vulnerabilities -01 May13 (Windows)
- Adobe Flash Player Buffer Overflow Vulnerability - Apr14 (Windows)
- Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability (Mac OS X)
- Adobe Air Multiple Vulnerabilities -01 August 12 (Mac OS X)