OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) - Nessus

Critical   Plugin ID: 111992

This page contains detailed information about the OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 111992
Name: OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)
Filename: oraclevm_OVMSA-2018-0248.nasl
Vulnerability Published: 2013-08-28
This Plugin Published: 2018-08-20
Last Modification Time: 2021-01-28
Plugin Version: 1.5
Plugin Type: local
Plugin Family: OracleVM Local Security Checks
Dependencies: ssh_get_info.nasl
Required KB Items [?]: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Vulnerability Information


Severity: Critical
Vulnerability Published: 2013-08-28
Patch Published: 2018-08-17
CVE [?]: CVE-2013-3495, CVE-2014-3566, CVE-2014-3672, CVE-2014-5146, CVE-2014-7188, CVE-2014-8594, CVE-2014-8595, CVE-2014-8866, CVE-2014-8867, CVE-2014-9065, CVE-2015-0361, CVE-2015-2044, CVE-2015-2045, CVE-2015-2151, CVE-2015-2152, CVE-2015-2751, CVE-2015-2752, CVE-2015-3340, CVE-2015-4163, CVE-2015-4164, CVE-2015-7812, CVE-2015-7813, CVE-2015-7814, CVE-2015-7835, CVE-2015-7969, CVE-2015-7970, CVE-2015-7971, CVE-2015-8550, CVE-2016-1570, CVE-2016-1571, CVE-2016-3712, CVE-2016-6258, CVE-2016-7777, CVE-2016-9603, CVE-2016-10013, CVE-2016-10024, CVE-2017-2615, CVE-2017-2620, CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2017-7228, CVE-2017-8903, CVE-2017-8904, CVE-2017-8905, CVE-2017-10912, CVE-2017-10913, CVE-2017-10914, CVE-2017-10915, CVE-2017-10917, CVE-2017-10918, CVE-2017-10920, CVE-2017-10921, CVE-2017-10922, CVE-2017-12135, CVE-2017-12136, CVE-2017-12137, CVE-2017-14316, CVE-2017-14317, CVE-2017-14319, CVE-2017-15588, CVE-2017-15589, CVE-2017-15590, CVE-2017-15592, CVE-2017-15593, CVE-2017-15594, CVE-2017-15595, CVE-2017-15597, CVE-2017-17044, CVE-2017-17045, CVE-2017-17563, CVE-2017-17564, CVE-2017-17565, CVE-2017-17566, CVE-2018-3620, CVE-2018-3639, CVE-2018-3646, CVE-2018-3665, CVE-2018-7540, CVE-2018-7541, CVE-2018-8897, CVE-2018-10981, CVE-2018-10982
CPE [?]: cpe:/o:oracle:vm_server:3.4, p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools
Exploited by Malware: True
In the News: True

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2018-0248 for details.

Solution

Update the affected xen / xen-tools packages.

Public Exploits


Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (Metasploit Framework, Exploit-DB, GitHub, Immunity Canvas)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) vulnerability:

  1. Metasploit: exploit/windows/local/mov_ss
    [Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability]
  2. Metasploit: auxiliary/scanner/http/ssl_version
    [HTTP SSL/TLS Version Detection (POODLE scanner)]
  3. Exploit-DB: exploits/windows/local/44697.txt
    [EDB-44697: Microsoft Windows - 'POP/MOV SS' Privilege Escalation]
  4. Exploit-DB: exploits/windows/local/45024.rb
    [EDB-45024: Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)]
  5. GitHub: https://github.com/84KaliPleXon3/a2sv
    [CVE-2014-3566]
  6. GitHub: https://github.com/Artem-Salnikov/devops-netology
    [CVE-2014-3566]
  7. GitHub: https://github.com/F4RM0X/script_a2sv
    [CVE-2014-3566]
  8. GitHub: https://github.com/H4CK3RT3CH/a2sv
    [CVE-2014-3566]
  9. GitHub: https://github.com/Mre11i0t/a2sv
    [CVE-2014-3566]
  10. GitHub: https://github.com/PwnCast/CVE-2014-3566
    [CVE-2014-3566: PoC for exploiting CVE-2014-3566 : The SSL protocol 3.0, as used in OpenSSL through ...]
  11. GitHub: https://github.com/Vladislav-Pugachev/netology-DevOps-dz_-14
    [CVE-2014-3566]
  12. GitHub: https://github.com/WiktorMysz/devops-netology
    [CVE-2014-3566]
  13. GitHub: https://github.com/alexandrburyakov/Rep2
    [CVE-2014-3566]
  14. GitHub: https://github.com/ashmastaflash/mangy-beast
    [CVE-2014-3566: CloudPassage Halo policy for detecting vulnerability to CVE-2014-3566 (AKA POODLE) ...]
  15. GitHub: https://github.com/bysart/devops-netology
    [CVE-2014-3566]
  16. GitHub: https://github.com/camel-clarkson/non-controlflow-hijacking-datasets
    [CVE-2014-3566]
  17. GitHub: https://github.com/fireorb/sslscanner
    [CVE-2014-3566]
  18. GitHub: https://github.com/giusepperuggiero96/Network-Security-2021
    [CVE-2014-3566]
  19. GitHub: https://github.com/ilya-starchikov/devops-netology
    [CVE-2014-3566]
  20. GitHub: https://github.com/marcocastro100/Intrusion_Detection_System-Python
    [CVE-2014-3566]
  21. GitHub: https://github.com/mikemackintosh/ruby-qualys
    [CVE-2014-3566]
  22. GitHub: https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook
    [CVE-2014-3566]
  23. GitHub: https://github.com/mpgn/poodle-PoC
    [CVE-2014-3566: :poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack ...]
  24. GitHub: https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan
    [CVE-2014-3566: A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, ...]
  25. GitHub: https://github.com/pashicop/3.9_1
    [CVE-2014-3566]
  26. GitHub: https://github.com/shanekeels/harden-ssl-tls-windows
    [CVE-2014-3566]
  27. GitHub: https://github.com/stdevel/poodle_protector
    [CVE-2014-3566: Python script for automatically protecting your systems against POODLE vulnerability ...]
  28. GitHub: https://github.com/vshaliii/Hacklab-Vulnix
    [CVE-2014-3566]
  29. GitHub: https://github.com/yellownine/netology-DevOps
    [CVE-2014-3566]
  30. GitHub: https://github.com/Al1ex/LinuxEelvation
    [CVE-2015-8550]
  31. GitHub: https://github.com/bsauce/kernel-exploit-factory
    [CVE-2015-8550]
  32. GitHub: https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter
    [CVE-2017-5715]
  33. GitHub: https://github.com/LawrenceHwang/PesterTest-Meltdown
    [CVE-2017-5715]
  34. GitHub: https://github.com/Spacial/awesome-csirt
    [CVE-2017-5715]
  35. GitHub: https://github.com/ambynotcoder/C-libraries
    [CVE-2017-5715]
  36. GitHub: https://github.com/asm/deep_spectre
    [CVE-2017-5715]
  37. GitHub: https://github.com/chaitanyarahalkar/Spectre-PoC
    [CVE-2017-5715]
  38. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2017-5715]
  39. GitHub: https://github.com/compris-com/spectre-meltdown-checker
    [CVE-2017-5715]
  40. GitHub: https://github.com/dgershman/sidecheck
    [CVE-2017-5715]
  41. GitHub: https://github.com/douyamv/MeltdownTool
    [CVE-2017-5715]
  42. GitHub: https://github.com/dubididum/Meltdown_Spectre_check
    [CVE-2017-5715]
  43. GitHub: https://github.com/eclypsium/revoked_firmware_updates_spectre
    [CVE-2017-5715]
  44. GitHub: https://github.com/feffi/docker-spectre
    [CVE-2017-5715]
  45. GitHub: https://github.com/geeksniper/reverse-engineering-toolkit
    [CVE-2017-5715]
  46. GitHub: https://github.com/gonoph/ansible-meltdown-spectre
    [CVE-2017-5715]
  47. GitHub: https://github.com/hackingportal/meltdownattack-and-spectre
    [CVE-2017-5715]
  48. GitHub: https://github.com/hannob/meltdownspectre-patches
    [CVE-2017-5715]
  49. GitHub: https://github.com/jarmouz/spectre_meltdown
    [CVE-2017-5715]
  50. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2017-5715]
  51. GitHub: https://github.com/kevincoakley/puppet-spectre_meltdown
    [CVE-2017-5715]
  52. GitHub: https://github.com/laddp/insights_reports
    [CVE-2017-5715]
  53. GitHub: https://github.com/lovesec/spectre---attack
    [CVE-2017-5715]
  54. GitHub: https://github.com/marcan/speculation-bugs
    [CVE-2017-5715]
  55. GitHub: https://github.com/mbruzek/check-spectre-meltdown-ansible
    [CVE-2017-5715]
  56. GitHub: https://github.com/microsoft/SpeculationControl
    [CVE-2017-5715]
  57. GitHub: https://github.com/mjaggi-cavium/spectre-meltdown-checker
    [CVE-2017-5715]
  58. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2017-5715]
  59. GitHub: https://github.com/pathakabhi24/Awesome-C
    [CVE-2017-5715]
  60. GitHub: https://github.com/projectboot/SpectreCompiled
    [CVE-2017-5715]
  61. GitHub: https://github.com/qazbnm456/awesome-cve-poc/blob/master/CVE-2017-5715.md
    [CVE-2017-5715]
  62. GitHub: https://github.com/raul23/spectre
    [CVE-2017-5715: Resources for the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715)]
  63. GitHub: https://github.com/rosenbergj/cpu-report
    [CVE-2017-5715]
  64. GitHub: https://github.com/ryandaniels/ansible-role-server-update-reboot
    [CVE-2017-5715]
  65. GitHub: https://github.com/savchenko/windows10
    [CVE-2017-5715]
  66. GitHub: https://github.com/sourcery-ai-bot/Deep-Security-Reports
    [CVE-2017-5715]
  67. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2017-5715]
  68. GitHub: https://github.com/ssstonebraker/meltdown_spectre
    [CVE-2017-5715]
  69. GitHub: https://github.com/stressboi/splunk-spectre-meltdown-uf-script
    [CVE-2017-5715]
  70. GitHub: https://github.com/timidri/puppet-meltdown
    [CVE-2017-5715]
  71. GitHub: https://github.com/uhub/awesome-c
    [CVE-2017-5715]
  72. GitHub: https://github.com/vrdse/MeltdownSpectreReport
    [CVE-2017-5715]
  73. GitHub: https://github.com/willyb321/willyb321-stars
    [CVE-2017-5715]
  74. GitHub: https://github.com/xymeng16/security
    [CVE-2017-5715]
  75. GitHub: https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter
    [CVE-2017-5753]
  76. GitHub: https://github.com/HacTF/poc--exp
    [CVE-2017-5753]
  77. GitHub: https://github.com/ambynotcoder/C-libraries
    [CVE-2017-5753]
  78. GitHub: https://github.com/asm/deep_spectre
    [CVE-2017-5753]
  79. GitHub: https://github.com/chaitanyarahalkar/Spectre-PoC
    [CVE-2017-5753]
  80. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2017-5753]
  81. GitHub: https://github.com/compris-com/spectre-meltdown-checker
    [CVE-2017-5753]
  82. GitHub: https://github.com/dgershman/sidecheck
    [CVE-2017-5753]
  83. GitHub: https://github.com/dingelish/SGXfail
    [CVE-2017-5753]
  84. GitHub: https://github.com/douyamv/MeltdownTool
    [CVE-2017-5753]
  85. GitHub: https://github.com/enderquestral/Reactifence-Thesis
    [CVE-2017-5753]
  86. GitHub: https://github.com/feffi/docker-spectre
    [CVE-2017-5753]
  87. GitHub: https://github.com/geeksniper/reverse-engineering-toolkit
    [CVE-2017-5753]
  88. GitHub: https://github.com/gonoph/ansible-meltdown-spectre
    [CVE-2017-5753]
  89. GitHub: https://github.com/hackingportal/meltdownattack-and-spectre
    [CVE-2017-5753]
  90. GitHub: https://github.com/hannob/meltdownspectre-patches
    [CVE-2017-5753]
  91. GitHub: https://github.com/ionescu007/SpecuCheck
    [CVE-2017-5753]
  92. GitHub: https://github.com/jarmouz/spectre_meltdown
    [CVE-2017-5753]
  93. GitHub: https://github.com/jinb-park/linux-exploit
    [CVE-2017-5753]
  94. GitHub: https://github.com/jungp0/Meltdown-Spectre
    [CVE-2017-5753]
  95. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2017-5753]
  96. GitHub: https://github.com/lovesec/spectre---attack
    [CVE-2017-5753]
  97. GitHub: https://github.com/m8urnett/Windows-Spectre-Meltdown-Mitigations
    [CVE-2017-5753]
  98. GitHub: https://github.com/marcan/speculation-bugs
    [CVE-2017-5753]
  99. GitHub: https://github.com/mbruzek/check-spectre-meltdown-ansible
    [CVE-2017-5753]
  100. GitHub: https://github.com/mjaggi-cavium/spectre-meltdown-checker
    [CVE-2017-5753]
  101. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2017-5753]
  102. GitHub: https://github.com/pathakabhi24/Awesome-C
    [CVE-2017-5753]
  103. GitHub: https://github.com/projectboot/SpectreCompiled
    [CVE-2017-5753]
  104. GitHub: https://github.com/qazbnm456/awesome-cve-poc/blob/master/CVE-2017-5753.md
    [CVE-2017-5753]
  105. GitHub: https://github.com/raul23/spectre
    [CVE-2017-5753: Resources for the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715)]
  106. GitHub: https://github.com/rosenbergj/cpu-report
    [CVE-2017-5753]
  107. GitHub: https://github.com/ryandaniels/ansible-role-server-update-reboot
    [CVE-2017-5753]
  108. GitHub: https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-
    [CVE-2017-5753]
  109. GitHub: https://github.com/savchenko/windows10
    [CVE-2017-5753]
  110. GitHub: https://github.com/sourcery-ai-bot/Deep-Security-Reports
    [CVE-2017-5753]
  111. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2017-5753]
  112. GitHub: https://github.com/ssstonebraker/meltdown_spectre
    [CVE-2017-5753]
  113. GitHub: https://github.com/timidri/puppet-meltdown
    [CVE-2017-5753]
  114. GitHub: https://github.com/uhub/awesome-c
    [CVE-2017-5753]
  115. GitHub: https://github.com/vrdse/MeltdownSpectreReport
    [CVE-2017-5753]
  116. GitHub: https://github.com/wateroot/poc-exp
    [CVE-2017-5753]
  117. GitHub: https://github.com/xymeng16/security
    [CVE-2017-5753]
  118. GitHub: https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter
    [CVE-2017-5754]
  119. GitHub: https://github.com/LawrenceHwang/PesterTest-Meltdown
    [CVE-2017-5754]
  120. GitHub: https://github.com/OSH-2018/4-uniqueufo
    [CVE-2017-5754]
  121. GitHub: https://github.com/OSH-2018/4-volltin
    [CVE-2017-5754]
  122. GitHub: https://github.com/Spacial/awesome-csirt
    [CVE-2017-5754]
  123. GitHub: https://github.com/UnlimitedGirth/GamingOptimization
    [CVE-2017-5754]
  124. GitHub: https://github.com/ambynotcoder/C-libraries
    [CVE-2017-5754]
  125. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2017-5754]
  126. GitHub: https://github.com/compris-com/spectre-meltdown-checker
    [CVE-2017-5754]
  127. GitHub: https://github.com/douyamv/MeltdownTool
    [CVE-2017-5754]
  128. GitHub: https://github.com/dubididum/Meltdown_Spectre_check
    [CVE-2017-5754]
  129. GitHub: https://github.com/feffi/docker-spectre
    [CVE-2017-5754]
  130. GitHub: https://github.com/geeksniper/reverse-engineering-toolkit
    [CVE-2017-5754]
  131. GitHub: https://github.com/gmolveau/starred
    [CVE-2017-5754]
  132. GitHub: https://github.com/gonoph/ansible-meltdown-spectre
    [CVE-2017-5754]
  133. GitHub: https://github.com/hackingportal/meltdownattack-and-spectre
    [CVE-2017-5754]
  134. GitHub: https://github.com/hannob/meltdownspectre-patches
    [CVE-2017-5754]
  135. GitHub: https://github.com/jarmouz/spectre_meltdown
    [CVE-2017-5754]
  136. GitHub: https://github.com/jungp0/Meltdown-Spectre
    [CVE-2017-5754]
  137. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2017-5754]
  138. GitHub: https://github.com/kevincoakley/puppet-spectre_meltdown
    [CVE-2017-5754]
  139. GitHub: https://github.com/leonv024/update_kernel
    [CVE-2017-5754]
  140. GitHub: https://github.com/marcan/speculation-bugs
    [CVE-2017-5754]
  141. GitHub: https://github.com/mbruzek/check-spectre-meltdown-ansible
    [CVE-2017-5754]
  142. GitHub: https://github.com/microsoft/SpeculationControl
    [CVE-2017-5754]
  143. GitHub: https://github.com/mjaggi-cavium/spectre-meltdown-checker
    [CVE-2017-5754]
  144. GitHub: https://github.com/mosajjal/Meltdown-Spectre-PoC
    [CVE-2017-5754]
  145. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2017-5754]
  146. GitHub: https://github.com/pathakabhi24/Awesome-C
    [CVE-2017-5754]
  147. GitHub: https://github.com/projectboot/SpectreCompiled
    [CVE-2017-5754]
  148. GitHub: https://github.com/qazbnm456/awesome-cve-poc/blob/master/CVE-2017-5754.md
    [CVE-2017-5754]
  149. GitHub: https://github.com/raul23/meltdown
    [CVE-2017-5754: Resources for the Meltdown vulnerability (CVE-2017-5754)]
  150. GitHub: https://github.com/renjithgr/starred-repos
    [CVE-2017-5754]
  151. GitHub: https://github.com/rosenbergj/cpu-report
    [CVE-2017-5754]
  152. GitHub: https://github.com/ryandaniels/ansible-role-server-update-reboot
    [CVE-2017-5754]
  153. GitHub: https://github.com/savchenko/windows10
    [CVE-2017-5754]
  154. GitHub: https://github.com/sderosiaux/every-single-day-i-tldr
    [CVE-2017-5754]
  155. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2017-5754]
  156. GitHub: https://github.com/ssstonebraker/meltdown_spectre
    [CVE-2017-5754]
  157. GitHub: https://github.com/stressboi/splunk-spectre-meltdown-uf-script
    [CVE-2017-5754]
  158. GitHub: https://github.com/timidri/puppet-meltdown
    [CVE-2017-5754]
  159. GitHub: https://github.com/tooru/meltdown-on-docker
    [CVE-2017-5754]
  160. GitHub: https://github.com/uhub/awesome-c
    [CVE-2017-5754]
  161. GitHub: https://github.com/vrdse/MeltdownSpectreReport
    [CVE-2017-5754]
  162. GitHub: https://github.com/wangtao13/poc_fix_meltdown
    [CVE-2017-5754]
  163. GitHub: https://github.com/willyb321/willyb321-stars
    [CVE-2017-5754]
  164. GitHub: https://github.com/jhembree/IACapstone
    [CVE-2017-7228]
  165. GitHub: https://github.com/mrngm/adviesmolen
    [CVE-2017-8903]
  166. GitHub: https://github.com/mrngm/adviesmolen
    [CVE-2017-8904]
  167. GitHub: https://github.com/mrngm/adviesmolen
    [CVE-2017-8905]
  168. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2018-3620]
  169. GitHub: https://github.com/interlunar/win10-regtweak
    [CVE-2018-3620]
  170. GitHub: https://github.com/ionescu007/SpecuCheck
    [CVE-2018-3620]
  171. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2018-3620]
  172. GitHub: https://github.com/microsoft/SpeculationControl
    [CVE-2018-3620]
  173. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2018-3620]
  174. GitHub: https://github.com/rosenbergj/cpu-report
    [CVE-2018-3620]
  175. GitHub: https://github.com/savchenko/windows10
    [CVE-2018-3620]
  176. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2018-3620]
  177. GitHub: https://github.com/timidri/puppet-meltdown
    [CVE-2018-3620]
  178. GitHub: https://github.com/ambynotcoder/C-libraries
    [CVE-2018-3639]
  179. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2018-3639]
  180. GitHub: https://github.com/houjingyi233/CPU-vulnerability-collections
    [CVE-2018-3639]
  181. GitHub: https://github.com/interlunar/win10-regtweak
    [CVE-2018-3639]
  182. GitHub: https://github.com/jinb-park/linux-exploit
    [CVE-2018-3639]
  183. GitHub: https://github.com/kaosagnt/ansible-everyday
    [CVE-2018-3639]
  184. GitHub: https://github.com/kevincoakley/puppet-spectre_meltdown
    [CVE-2018-3639]
  185. GitHub: https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate
    [CVE-2018-3639]
  186. GitHub: https://github.com/microsoft/SpeculationControl
    [CVE-2018-3639]
  187. GitHub: https://github.com/mjaggi-cavium/spectre-meltdown-checker
    [CVE-2018-3639]
  188. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2018-3639]
  189. GitHub: https://github.com/pathakabhi24/Awesome-C
    [CVE-2018-3639]
  190. GitHub: https://github.com/rosenbergj/cpu-report
    [CVE-2018-3639]
  191. GitHub: https://github.com/savchenko/windows10
    [CVE-2018-3639]
  192. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2018-3639]
  193. GitHub: https://github.com/timidri/puppet-meltdown
    [CVE-2018-3639]
  194. GitHub: https://github.com/uhub/awesome-c
    [CVE-2018-3639]
  195. GitHub: https://github.com/willyb321/willyb321-stars
    [CVE-2018-3639]
  196. GitHub: https://github.com/xairy/linux-kernel-exploitation
    [CVE-2018-3639]
  197. GitHub: https://github.com/carrtesy/Network_research_report
    [CVE-2018-3646]
  198. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2018-3646]
  199. GitHub: https://github.com/gregvish/l1tf-poc
    [CVE-2018-3646]
  200. GitHub: https://github.com/interlunar/win10-regtweak
    [CVE-2018-3646]
  201. GitHub: https://github.com/kyberdrb/arch_linux_installation_guide
    [CVE-2018-3646]
  202. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2018-3646]
  203. GitHub: https://github.com/omniosorg/lx-port-data
    [CVE-2018-3646]
  204. GitHub: https://github.com/rosenbergj/cpu-report
    [CVE-2018-3646]
  205. GitHub: https://github.com/savchenko/windows10
    [CVE-2018-3646]
  206. GitHub: https://github.com/speed47/spectre-meltdown-checker
    [CVE-2018-3646]
  207. GitHub: https://github.com/teusink/Home-Security-by-W10-Hardening
    [CVE-2018-3646]
  208. GitHub: https://github.com/timidri/puppet-meltdown
    [CVE-2018-3646]
  209. GitHub: https://github.com/codexlynx/hardware-attacks-state-of-the-art
    [CVE-2018-3665]
  210. GitHub: https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
    [CVE-2018-3665]
  211. GitHub: https://github.com/Apri1y/Red-Team-links
    [CVE-2018-8897]
  212. GitHub: https://github.com/CrackerCat/Kernel-Security-Development
    [CVE-2018-8897]
  213. GitHub: https://github.com/Echocipher/Resource-list
    [CVE-2018-8897]
  214. GitHub: https://github.com/ExpLife0011/awesome-windows-kernel-security-development
    [CVE-2018-8897]
  215. GitHub: https://github.com/Ondrik8/exploit
    [CVE-2018-8897]
  216. GitHub: https://github.com/hudunkey/Red-Team-links
    [CVE-2018-8897]
  217. GitHub: https://github.com/john-80/-007
    [CVE-2018-8897]
  218. GitHub: https://github.com/lp008/Hack-readme
    [CVE-2018-8897]
  219. GitHub: https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development
    [CVE-2018-8897]
  220. GitHub: https://github.com/pravinsrc/NOTES-windows-kernel-links
    [CVE-2018-8897]
  221. GitHub: https://github.com/slimdaddy/RedTeam
    [CVE-2018-8897]
  222. GitHub: https://github.com/whiteHat001/Kernel-Security
    [CVE-2018-8897]
  223. GitHub: https://github.com/xiaoZ-hc/redtool
    [CVE-2018-8897]
  224. GitHub: https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html
    [CVE-2018-8897]
  225. GitHub: https://github.com/offensive-security/exploitdb-bin-sploits/blob/master/bin-sploits/44697.zip
    [EDB-44697]
  226. GitHub: https://github.com/cloudpassage/mangy-beast
    [CVE-2014-3566: CloudPassage Halo policy for detecting vulnerability to CVE-2014-3566 (AKA POODLE) ...]
  227. GitHub: https://github.com/dmo2118/retpoline-audit
    [CVE-2017-5715: A quick-and-dirty tool to verify that userspace executables are immune to Spectre ...]
  228. GitHub: https://github.com/EdwardOwusuAdjei/Spectre-PoC
    [CVE-2017-5715: Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.]
  229. GitHub: https://github.com/Eugnis/spectre-attack
    [CVE-2017-5715: Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)]
  230. GitHub: https://github.com/GarnetSunset/CiscoSpectreTakeover
    [CVE-2017-5715: A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into ...]
  231. GitHub: https://github.com/GregAskew/SpeculativeExecutionAssessment
    [CVE-2017-5715: Assesses a system for the "speculative execution" vulnerabilities described in ...]
  232. GitHub: https://github.com/ionescu007/SpecuCheck
    [CVE-2017-5715: SpecuCheck is a Windows utility for checking the state of the software mitigations ...]
  233. GitHub: https://github.com/ixtal23/spectreScope
    [CVE-2017-5715: The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715). ...]
  234. GitHub: https://github.com/opsxcq/exploit-cve-2017-5715
    [CVE-2017-5715: Spectre exploit]
  235. GitHub: https://github.com/pedrolucasoliva/spectre-attack-demo
    [CVE-2017-5715: Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)]
  236. GitHub: https://github.com/poilynx/spectre-attack-example
    [CVE-2017-5715: 2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用]
  237. GitHub: https://github.com/Viralmaniar/In-Spectre-Meltdown
    [CVE-2017-5715: This tool allows to check speculative execution side-channel attacks that affect ...]
  238. GitHub: https://github.com/albertleecn/cve-2017-5753
    [CVE-2017-5753: OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of ...]
  239. GitHub: https://github.com/EdwardOwusuAdjei/Spectre-PoC
    [CVE-2017-5753: Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.]
  240. GitHub: https://github.com/Eugnis/spectre-attack
    [CVE-2017-5753: Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)]
  241. GitHub: https://github.com/GarnetSunset/CiscoSpectreTakeover
    [CVE-2017-5753: A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into ...]
  242. GitHub: https://github.com/GregAskew/SpeculativeExecutionAssessment
    [CVE-2017-5753: Assesses a system for the "speculative execution" vulnerabilities described in ...]
  243. GitHub: https://github.com/ixtal23/spectreScope
    [CVE-2017-5753: The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715). ...]
  244. GitHub: https://github.com/mathse/meltdown-spectre-bios-list
    [CVE-2017-5753: a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 ...]
  245. GitHub: https://github.com/pedrolucasoliva/spectre-attack-demo
    [CVE-2017-5753: Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)]
  246. GitHub: https://github.com/poilynx/spectre-attack-example
    [CVE-2017-5753: 2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用]
  247. GitHub: https://github.com/GregAskew/SpeculativeExecutionAssessment
    [CVE-2017-5754: Assesses a system for the "speculative execution" vulnerabilities described in ...]
  248. GitHub: https://github.com/ionescu007/SpecuCheck
    [CVE-2017-5754: SpecuCheck is a Windows utility for checking the state of the software mitigations ...]
  249. GitHub: https://github.com/jdmulloy/meltdown-aws-scanner
    [CVE-2017-5754: Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances ...]
  250. GitHub: https://github.com/mathse/meltdown-spectre-bios-list
    [CVE-2017-5754: a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 ...]
  251. GitHub: https://github.com/raphaelsc/Am-I-affected-by-Meltdown
    [CVE-2017-5754: Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant ...]
  252. GitHub: https://github.com/speecyy/Am-I-affected-by-Meltdown
    [CVE-2017-5754: Proof-of-concept / Exploit / checks whether system is affected by Variant 3: rogue ...]
  253. GitHub: https://github.com/Viralmaniar/In-Spectre-Meltdown
    [CVE-2017-5754: This tool allows to check speculative execution side-channel attacks that affect ...]
  254. GitHub: https://github.com/zzado/Meltdown
    [CVE-2017-5754: PoC for Meltdown in linux (CVE-2017-5754)]
  255. GitHub: https://github.com/ionescu007/SpecuCheck
    [CVE-2018-3639: SpecuCheck is a Windows utility for checking the state of the software mitigations ...]
  256. GitHub: https://github.com/mmxsrup/CVE-2018-3639
    [CVE-2018-3639: Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux]
  257. GitHub: https://github.com/tyhicks/ssbd-tools
    [CVE-2018-3639: Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) ...]
  258. GitHub: https://github.com/can1357/CVE-2018-8897
    [CVE-2018-8897: Arbitrary code execution with kernel privileges using CVE-2018-8897.]
  259. GitHub: https://github.com/jiazhang0/pop-mov-ss-exploit
    [CVE-2018-8897: The exploitation for CVE-2018-8897]
  260. GitHub: https://github.com/nmulasmajic/CVE-2018-8897
    [CVE-2018-8897: Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine ...]
  261. GitHub: https://github.com/nmulasmajic/syscall_exploit_CVE-2018-8897
    [CVE-2018-8897: Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to ...]
  262. GitHub: https://github.com/mathse/meltdown-spectre-bios-list
    [CVE-2017-5715: A list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 ...]
  263. GitHub: https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4-
    [CVE-2018-3639: Spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux]
  264. Immunity Canvas: CANVAS

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS V2 Vector [?]: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
CVSS Base Score:10.0 (High)
Impact Subscore:10.0
Exploitability Subscore:10.0
CVSS Temporal Score:7.8 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:7.8 (High)
CVSS V3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CVSS Base Score:10.0 (Critical)
Impact Subscore:6.0
Exploitability Subscore:3.9
CVSS Temporal Score:9.5 (Critical)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:9.5 (Critical)

Go back to menu.

Plugin Source


This is the oraclevm_OVMSA-2018-0248.nasl nessus plugin source code. This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.

#
# (C) Tenable Network Security, Inc.
#
# The package checks in this plugin were extracted from OracleVM
# Security Advisory OVMSA-2018-0248.
#

include("compat.inc");

if (description)
{
  script_id(111992);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/28");

  script_cve_id("CVE-2013-3495", "CVE-2014-3566", "CVE-2014-3672", "CVE-2014-5146", "CVE-2014-7188", "CVE-2014-8594", "CVE-2014-8595", "CVE-2014-8866", "CVE-2014-8867", "CVE-2014-9065", "CVE-2015-0361", "CVE-2015-2044", "CVE-2015-2045", "CVE-2015-2151", "CVE-2015-2152", "CVE-2015-2751", "CVE-2015-2752", "CVE-2015-3340", "CVE-2015-4163", "CVE-2015-4164", "CVE-2015-7812", "CVE-2015-7813", "CVE-2015-7814", "CVE-2015-7835", "CVE-2015-7969", "CVE-2015-7970", "CVE-2015-7971", "CVE-2015-8550", "CVE-2016-10013", "CVE-2016-10024", "CVE-2016-1570", "CVE-2016-1571", "CVE-2016-3712", "CVE-2016-6258", "CVE-2016-7777", "CVE-2016-9603", "CVE-2017-10912", "CVE-2017-10913", "CVE-2017-10914", "CVE-2017-10915", "CVE-2017-10917", "CVE-2017-10918", "CVE-2017-10920", "CVE-2017-10921", "CVE-2017-10922", "CVE-2017-12135", "CVE-2017-12136", "CVE-2017-12137", "CVE-2017-14316", "CVE-2017-14317", "CVE-2017-14319", "CVE-2017-15588", "CVE-2017-15589", "CVE-2017-15590", "CVE-2017-15592", "CVE-2017-15593", "CVE-2017-15594", "CVE-2017-15595", "CVE-2017-15597", "CVE-2017-17044", "CVE-2017-17045", "CVE-2017-17563", "CVE-2017-17564", "CVE-2017-17565", "CVE-2017-17566", "CVE-2017-2615", "CVE-2017-2620", "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "CVE-2017-7228", "CVE-2017-8903", "CVE-2017-8904", "CVE-2017-8905", "CVE-2018-10981", "CVE-2018-10982", "CVE-2018-3620", "CVE-2018-3639", "CVE-2018-3646", "CVE-2018-3665", "CVE-2018-7540", "CVE-2018-7541", "CVE-2018-8897");
  script_bugtraq_id(61854, 69198, 70198, 70574, 71149, 71151, 71331, 71332, 71544, 71882, 72954, 72955, 73015, 73068, 73443, 73448, 74248, 75141, 75149);

  script_name(english:"OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)");
  script_summary(english:"Checks the RPM output for the updated packages.");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote OracleVM host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote OracleVM system is missing necessary patches to address
critical security updates : please see Oracle VM Security Advisory
OVMSA-2018-0248 for details."
  );
  # https://oss.oracle.com/pipermail/oraclevm-errata/2018-August/000884.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?5a675193"
  );
  script_set_attribute(
    attribute:"solution",
    value:"Update the affected xen / xen-tools packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:'CANVAS');

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:xen");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:xen-tools");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:vm_server:3.4");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/08/28");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/08/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/20");
  script_set_attribute(attribute:"in_the_news", value:"true");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"OracleVM Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/OracleVM/release", "Host/OracleVM/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/OracleVM/release");
if (isnull(release) || "OVS" >!< release) audit(AUDIT_OS_NOT, "OracleVM");
if (! preg(pattern:"^OVS" + "3\.4" + "(\.[0-9]|$)", string:release)) audit(AUDIT_OS_NOT, "OracleVM 3.4", "OracleVM " + release);
if (!get_kb_item("Host/OracleVM/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "OracleVM", cpu);
if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);

flag = 0;
if (rpm_exists(rpm:"xen-4.4.4-155", release:"OVS3.4") && rpm_check(release:"OVS3.4", reference:"xen-4.4.4-155.0.43.el6")) flag++;
if (rpm_exists(rpm:"xen-tools-4.4.4-155", release:"OVS3.4") && rpm_check(release:"OVS3.4", reference:"xen-tools-4.4.4-155.0.43.el6")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xen / xen-tools");
}

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/oraclevm_OVMSA-2018-0248.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\oraclevm_OVMSA-2018-0248.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/oraclevm_OVMSA-2018-0248.nasl

Go back to menu.

How to Run


Here is how to run the OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select OracleVM Local Security Checks plugin family.
  6. On the right side table select OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) plugin ID 111992.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl oraclevm_OVMSA-2018-0248.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a oraclevm_OVMSA-2018-0248.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - oraclevm_OVMSA-2018-0248.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state oraclevm_OVMSA-2018-0248.nasl -t <IP/HOST>

Go back to menu.

References


BID | SecurityFocus Bugtraq ID: See also: Similar and related Nessus plugins:
  • 111829 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2359-1) (Foreshadow)
  • 111830 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2362-1) (Foreshadow)
  • 111831 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2363-1) (Foreshadow)
  • 111832 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2364-1) (Foreshadow)
  • 111833 - SUSE SLES11 Security Update : kernel (SUSE-SU-2018:2366-1) (Foreshadow)
  • 111834 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2367-1) (Foreshadow)
  • 111835 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2368-1) (Foreshadow)
  • 111836 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2369-1) (Foreshadow)
  • 111837 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2374-1) (Foreshadow)
  • 111838 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2384-1) (Foreshadow)
  • 111839 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2387-1) (Foreshadow)
  • 111841 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2389-1) (Foreshadow)
  • 111842 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2391-1) (Foreshadow)
  • 111909 - Photon OS 1.0: Linux PHSA-2018-1.0-0097 (deprecated)
  • 111911 - Photon OS 1.0: Linux PHSA-2018-1.0-0098 (deprecated)
  • 111933 - Photon OS 1.0: Linux PHSA-2018-1.0-0132-(a) (deprecated)
  • 111988 - Debian DSA-4279-1 : linux - security update (Foreshadow)
  • 111997 - openSUSE Security Update : the Linux Kernel (openSUSE-2018-885) (Foreshadow)
  • 112003 - openSUSE Security Update : qemu (openSUSE-2018-894) (Spectre)
  • 112008 - openSUSE Security Update : xen (openSUSE-2018-910) (Foreshadow)
  • 112009 - openSUSE Security Update : xen (openSUSE-2018-911) (Foreshadow)
  • 112010 - SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:2401-1) (Foreshadow)
  • 112013 - SUSE SLES12 Security Update : xen (SUSE-SU-2018:2410-1) (Foreshadow)
  • 112016 - SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2416-1) (Foreshadow)
  • 112017 - Ubuntu 14.04 LTS : Linux kernel regressions (USN-3741-3) (Foreshadow)
  • 112018 - Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-055)
  • 112024 - OracleVM 3.4 : xen (OVMSA-2018-0251) (Foreshadow)
  • 112026 - RHEL 7 : Virtualization (RHSA-2018:2402) (Foreshadow)
  • 112027 - RHEL 7 : Virtualization (RHSA-2018:2403) (Foreshadow)
  • 112028 - RHEL 6 / 7 : Virtualization (RHSA-2018:2404) (Foreshadow)
  • 112031 - openSUSE Security Update : ucode-intel (openSUSE-2018-887) (Foreshadow) (Spectre)
  • 112069 - FreeBSD : FreeBSD -- L1 Terminal Fault (L1TF) Kernel Information Disclosure (2310b814-a652-11e8-805b-a4badb2f4699) (Foreshadow)
  • 112080 - SUSE SLES12 Security Update : xen (SUSE-SU-2018:2480-1) (Foreshadow)
  • 112082 - SUSE SLES11 Security Update : xen (SUSE-SU-2018:2482-1) (Foreshadow)

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file oraclevm_OVMSA-2018-0248.nasl version 1.5. For more plugins, visit the Nessus Plugin Library.

Go back to menu.