CTX209443
2016-04-20
1970-01-01
A number of security vulnerabilities have been identified in Citrix XenServer. The following vulnerabilities have been addressed: ...

Description of Problem

A number of security vulnerabilities have been identified in Citrix XenServer. The following vulnerabilities have been addressed:

  • CVE-2015-5621 (Medium): incorrectly handled SNMP PDU parsing failures
    This issue may allow a malicious attacker on the management network to attack the host SNMP daemon if it has been exposed through the firewall.
  • CVE-2016-2271 (Low): VMX: guest user mode may crash guest with non-canonical RIP
    This issue may allow a malicious guest user to crash that guest.
  • CVE-2016-3158/CVE-2016-3159 (Low): broken AMD FPU FIP/FDP/FOP leak workaround
    This issue may allow a malicious guest administrator to obtain low-value information from other VMs at a low rate.
  • CVE-2016-3960 (Low): x86 shadow pagetables: address width overflow
    This issue may allow a malicious guest administrator to crash the host machine.

Mitigating Factors

CVE-2015-5621 is only applicable to hosts where the SNMP service has been exposed. Citrix XenServer itself does not expose this service but the installation of host-manufacturer-specific supplementary packs may change this.

CVE-2016-2271 is only applicable to HVM guests running on Intel CPUs.

CVE-2016-3158/CVE-2016-3159 is only applicable to Citrix XenServer 6.5 SP1 running on AMD CPUs.

CVE-2016-3960 is only applicable to HVM guests running on systems which either do not support Hardware Assisted Paging (HAP) or where HAP has been explicitly disabled by the host administrator.


What Customers Should Do

Hotfixes have been released to address these issues. Citrix recommends that affected customers install these hotfixes, which can be downloaded from the following locations:

Citrix XenServer 6.5 SP1: CTX209498 – https://support.citrix.comhttp://support.ctx.org.cn/CTX209498.citrix

Citrix XenServer 6.2 SP1: CTX209497 – https://support.citrix.comhttp://support.ctx.org.cn/CTX209497.citrix

Citrix XenServer 6.1: CTX209496 – https://support.citrix.comhttp://support.ctx.org.cn/CTX209496.citrix

Citrix XenServer 6.0.2: CTX209494 – https://support.citrix.comhttp://support.ctx.org.cn/CTX209494.citrix

Citrix XenServer 6.0.2 Common Criteria: CTX209495 – https://support.citrix.comhttp://support.ctx.org.cn/CTX209495.citrix

Citrix XenServer 6.0: CTX209493 – https://support.citrix.comhttp://support.ctx.org.cn/CTX209493.citrix

??

??


What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at?? /.


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at?? http://www.citrix.com/site/ss/supportContacts.asp.


Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 –?? Reporting Security Issues to Citrix


Changelog

Date Change
April 18th 2016 Initial bulletin publishing
April 20th 2016 Addition of Changelog, update to URL in What Custoemrs Should Do section

 

Join the conversation

Citrix Discussions

Open a case

Citrix Support

特别说明


本文来源为Citrix.com所有,翻译后版权归翻译者所有.如需转载请注明出处.

文档版本


.

广告招租


最新留言


.

广告招租


.