Citrix addressed vulnerabilities in Hypervisor that could be exploited by threat actors to execute code in a virtual machine to trigger a denial of service condition on the host.
US CISA warns that Citrix has released security updates to address flaws in Hypervisor that could be exploited by threat actors to execute code in a virtual machine to trigger a denial of service condition on the host.
Citrix Hypervisor (XenServer) is a high-performance hypervisor optimized for virtual app and desktop workloads and based on the Xen Project hypervisor.
“Citrix has released security updates to address vulnerabilities in Hypervisor (formerly XenServer). An attacker could exploit some of these vulnerabilities to cause a denial-of-service condition.” reads the advisory published by CISA.
“CISA encourages users and administrators to review Citrix Security Update CTX306565 and apply the necessary updates.”
The two vulnerabilities, tracked as CVE-2021-28038 and CVE-2021-28688, could be abused to cause the host to crash or become unresponsive. An attacker would have to be able to execute privileged code in a guest virtual machine.
“Two security issues have been identified in Citrix Hypervisor (formerly Citrix XenServer) that may allow privileged code in a guest VM to cause the host to crash or become unresponsive.” reads the advisory published by Citrix.
“These issues affect all currently supported versions of Citrix Hypervisor up to and including Citrix Hypervisor 8.2 LTSR.”
The CVE-2021-28038 vulnerability is a Uncontrolled Resource Consumption issue, it could be exploited by an attacker with the ability to execute privileged mode code in a guest can perform a denial of service attack against the host.
“An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver.” reads the security advisory.
The flaw was caused by an incomplete fix for CVE-2021-26931.
The CVE-2021-28688 vulnerability is also an Uncontrolled Resource Consumption issue that impacts all Linux versions that include the fix for CVE-2021-26930 (XSA-365).
“A malicious or buggy frontend driver may be able to cause resource leaks from the corresponding backend driver. This can result in a host-wide Denial of Sevice (DoS).” reads the advisory.
Citrix also fixed another issue, tracked CVE-2020-35498, that affects Hypervisor 8.2 LTSR only, and which could result in malicious network traffic causing subsequent packets to be dropped.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, CITRIX)
You may be interested in...
The post US CISA warns of DoS flaws in Citrix Hypervisor appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.