The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Citrix XenServer

Xen: denial of service via INVPCID Non-canonical Addresses
An attacker, inside a guest system, can generate a fatal error via INVPCID Non-canonical Addresses of Xen, in order to trigger a denial of service on the host system...
CERTFR-2018-AVI-564, CERTFR-2018-AVI-566, CTX239432, CVE-2018-19965, DSA-4369-1, FEDORA-2018-2fde555d91, FEDORA-2019-3e89502cb1, FEDORA-2019-bce6498890, openSUSE-SU-2018:4111-1, openSUSE-SU-2018:4304-1, openSUSE-SU-2019:1226-1, SUSE-SU-2018:4070-1, SUSE-SU-2018:4300-1, SUSE-SU-2019:0003-1, SUSE-SU-2019:0020-1, SUSE-SU-2019:0827-1, SUSE-SU-2019:13921-1, SUSE-SU-2019:14011-1, SUSE-SU-2020:0388-1, VIGILANCE-VUL-27846, XSA-279
Xen: privilege escalation via Insufficient AMD IOMMU TLB Flushing
An attacker, inside a guest system, can bypass restrictions via Insufficient TLB Flushing of Xen, in order to escalate his privileges on the host system...
CERTFR-2018-AVI-564, CERTFR-2018-AVI-566, CTX239432, CVE-2018-19961, CVE-2018-19962, DLA-1949-1, DSA-4369-1, FEDORA-2018-2fde555d91, FEDORA-2019-3e89502cb1, FEDORA-2019-bce6498890, openSUSE-SU-2018:4111-1, openSUSE-SU-2018:4304-1, openSUSE-SU-2019:1226-1, SUSE-SU-2018:4070-1, SUSE-SU-2018:4300-1, SUSE-SU-2019:0003-1, SUSE-SU-2019:0020-1, SUSE-SU-2019:0825-1, SUSE-SU-2019:0827-1, SUSE-SU-2019:13921-1, SUSE-SU-2019:14011-1, VIGILANCE-VUL-27843, XSA-275
Xen: NULL pointer dereference via Disabled Nested VT-x
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via Disabled Nested VT-x of Xen, in order to trigger a denial of service on the host system...
CERTFR-2018-AVI-514, CERTFR-2018-AVI-520, CTX239100, CVE-2018-18883, FEDORA-2018-2fde555d91, FEDORA-2018-73dd8de892, FEDORA-2018-a24754252a, FEDORA-2018-f20a0cead5, FEDORA-2019-3e89502cb1, openSUSE-SU-2018:4111-1, openSUSE-SU-2018:4304-1, SUSE-SU-2018:4070-1, SUSE-SU-2018:4300-1, SUSE-SU-2019:0003-1, VIGILANCE-VUL-27614, XSA-278
OpenSSH: information disclosure via Username Enumeration
An attacker can bypass access restrictions to data via Username Enumeration of OpenSSH, in order to obtain sensitive information...
1170352, bulletinjan2019, CERTFR-2018-AVI-410, CERTFR-2020-AVI-259, CTX272237, CVE-2018-15473, DLA-1474-1, DSA-2019-131, DSA-4280-1, FEDORA-2018-065a7722ee, FEDORA-2018-f56ded11c4, NTAP-20181101-0001, openSUSE-SU-2018:3801-1, openSUSE-SU-2018:3946-1, RHSA-2019:0711-01, RHSA-2019:2143-01, SB10267, SSB-439005, SUSE-SU-2018:3540-1, SUSE-SU-2018:3686-1, SUSE-SU-2018:3768-1, SUSE-SU-2018:3776-1, SUSE-SU-2018:3781-1, SUSE-SU-2018:3910-1, SYMSA1469, USN-3809-1, VIGILANCE-VUL-27016
Xen: privilege escalation via XAPI
An attacker can bypass restrictions via XAPI of Xen, in order to escalate his privileges...
CERTFR-2018-AVI-388, CERTFR-2018-AVI-391, CTX236548, CVE-2018-14007, VIGILANCE-VUL-27005, XSA-271
Xen: privilege escalation via Linux Netback Driver
An attacker can bypass restrictions via Linux Netback Driver of Xen, in order to escalate his privileges...
CERTFR-2018-AVI-388, CERTFR-2018-AVI-391, CERTFR-2018-AVI-557, CTX236548, CVE-2018-15471, DLA-1715-1, DSA-4313-1, FEDORA-2018-79d7c3d2df, FEDORA-2018-8422d94975, USN-3819-1, USN-3820-1, USN-3820-2, USN-3820-3, VIGILANCE-VUL-27004, XSA-270
Xen: denial of service via x86 MSR_DEBUGCTL
An attacker, inside a guest system, can generate a fatal error via x86 MSR_DEBUGCTL of Xen, in order to trigger a denial of service on the host system...
CERTFR-2018-AVI-388, CERTFR-2018-AVI-391, CTX236548, CVE-2018-15468, FEDORA-2018-683dfde81a, FEDORA-2018-915602df63, openSUSE-SU-2018:4304-1, SUSE-SU-2018:3332-1, SUSE-SU-2018:3490-1, SUSE-SU-2018:4300-1, VIGILANCE-VUL-27003, XSA-269
Intel processors: information disclosure via Foreshadow L1TF Virtualization
An attacker can bypass access restrictions to data via L1TF Virtualization on Intel processors, in order to obtain sensitive information...
525211, 528031, ADV180018, CERTFR-2018-AVI-385, CERTFR-2018-AVI-386, CERTFR-2018-AVI-387, CERTFR-2018-AVI-388, CERTFR-2018-AVI-390, CERTFR-2018-AVI-391, CERTFR-2018-AVI-392, CERTFR-2018-AVI-416, CERTFR-2018-AVI-419, CERTFR-2018-AVI-426, CERTFR-2018-AVI-557, CERTFR-2018-AVI-584, CERTFR-2019-AVI-169, CERTFR-2019-AVI-242, CERTFR-2019-AVI-489, cisco-sa-20180814-cpusidechannel, cpuapr2019, cpujan2019, CTX236548, CVE-2018-3646, DLA-1481-1, DLA-1506-1, DSA-2018-170, DSA-2018-217, DSA-2019-030, DSA-4274-1, DSA-4279-1, DSA-4279-2, FEDORA-2018-1c80fea1cd, FEDORA-2018-f8cba144ae, FG-IR-18-002, Foreshadow, FreeBSD-SA-18:09.l1tf, HPESBHF03874, HT209139, HT209193, ibm10742755, INTEL-SA-00161, JSA10937, K31300402, openSUSE-SU-2018:2399-1, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, openSUSE-SU-2018:2434-1, openSUSE-SU-2018:2436-1, openSUSE-SU-2018:4304-1, RHSA-2018:2384-01, RHSA-2018:2387-01, RHSA-2018:2388-01, RHSA-2018:2389-01, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, RHSA-2018:2395-01, RHSA-2018:2396-01, RHSA-2018:2602-01, RHSA-2018:2603-01, SSA-254686, SSA-608355, STORM-2018-005, SUSE-SU-2018:2328-1, SUSE-SU-2018:2331-1, SUSE-SU-2018:2332-1, SUSE-SU-2018:2335-1, SUSE-SU-2018:2338-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2362-1, SUSE-SU-2018:2366-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2384-1, SUSE-SU-2018:2394-1, SUSE-SU-2018:2401-1, SUSE-SU-2018:2409-1, SUSE-SU-2018:2410-1, SUSE-SU-2018:2480-1, SUSE-SU-2018:2482-1, SUSE-SU-2018:2483-1, SUSE-SU-2018:2528-1, SUSE-SU-2018:2596-1, SUSE-SU-2018:2637-1, SUSE-SU-2018:3490-1, SUSE-SU-2018:4300-1, Synology-SA-18:45, USN-3740-1, USN-3740-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, USN-3756-1, USN-3823-1, VIGILANCE-VUL-26999, VMSA-2018-0020, VU#982149, XSA-273, XSA-289
Intel processors: information disclosure via Foreshadow L1TF OS/SMM
An attacker can bypass access restrictions to data via L1TF OS/SMM on Intel processors, in order to obtain sensitive information...
525211, 528031, ADV180018, CERTFR-2018-AVI-385, CERTFR-2018-AVI-386, CERTFR-2018-AVI-387, CERTFR-2018-AVI-388, CERTFR-2018-AVI-390, CERTFR-2018-AVI-391, CERTFR-2018-AVI-392, CERTFR-2018-AVI-416, CERTFR-2018-AVI-419, CERTFR-2018-AVI-426, CERTFR-2018-AVI-557, CERTFR-2018-AVI-584, CERTFR-2019-AVI-169, CERTFR-2019-AVI-242, CERTFR-2019-AVI-489, cisco-sa-20180814-cpusidechannel, cpuapr2019, CTX236548, CVE-2018-3620, DLA-1481-1, DLA-1506-1, DLA-1529-1, DSA-2018-170, DSA-2018-217, DSA-2019-030, DSA-4274-1, DSA-4279-1, DSA-4279-2, FEDORA-2018-1c80fea1cd, FEDORA-2018-f8cba144ae, FG-IR-18-002, Foreshadow, FreeBSD-SA-18:09.l1tf, HPESBHF03874, ibm10742755, INTEL-SA-00161, JSA10917, JSA10937, K95275140, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, RHSA-2018:2384-01, RHSA-2018:2387-01, RHSA-2018:2388-01, RHSA-2018:2389-01, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, RHSA-2018:2395-01, RHSA-2018:2396-01, RHSA-2018:2602-01, RHSA-2018:2603-01, SSA:2018-240-01, SSA-254686, SSA-608355, STORM-2018-005, SUSE-SU-2018:2328-1, SUSE-SU-2018:2332-1, SUSE-SU-2018:2344-1, SUSE-SU-2018:2362-1, SUSE-SU-2018:2366-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2384-1, SUSE-SU-2018:2596-1, SUSE-SU-2018:2637-1, Synology-SA-18:45, USN-3740-1, USN-3740-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, USN-3823-1, VIGILANCE-VUL-26998, VMSA-2018-0021, VU#982149, XSA-273, XSA-289
Xen: denial of service via X86 DB Exception Safety Check
An attacker, inside a guest system, can generate a fatal error via X86 DB Exception Safety Check of Xen, in order to trigger a denial of service on the host system...
CERTFR-2018-AVI-314, CERTFR-2018-AVI-316, CERTFR-2018-AVI-318, CTX235748, CVE-2018-12893, DLA-1577-1, DSA-4236-1, FEDORA-2018-1a467757ce, FEDORA-2018-a7862a75f5, openSUSE-SU-2018:2116-1, openSUSE-SU-2018:2211-1, SUSE-SU-2018:1981-1, SUSE-SU-2018:2037-1, SUSE-SU-2018:2056-1, SUSE-SU-2018:2059-1, SUSE-SU-2018:2069-1, SUSE-SU-2018:2081-1, SUSE-SU-2018:2528-1, VIGILANCE-VUL-26562, XSA-265
Our database contains other pages. You can request a free trial to read them.

Display information about Citrix XenServer: