---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Fedora Xen VNC Server Host File Disclosure Security Issue SECUNIA ADVISORY ID: SA24575 VERIFY ADVISORY: http://secunia.com/advisories/24575/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: >From local network OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has acknowledged a security issue, which can be exploited by malicious users to gain knowledge of sensitive information. The security issue is caused due to an error within the QEMU VNC code used by Xen for fully virtualised machines, which can be exploited to read arbitrary files on the host system. Successful exploitation requires that the QEMU monitor mode is enabled and that the attacker has access to the VNC server. SOLUTION: Apply updated packages. -- Fedora Core 5 -- c297d6797d1ce0661faa6aba24d935dad39f802a SRPMS/xen-3.0.3-5.fc5.src.rpm c297d6797d1ce0661faa6aba24d935dad39f802a noarch/xen-3.0.3-5.fc5.src.rpm 539fcaf6c27e935ba71438a24d73e254e10fe485 x86_64/debug/xen-debuginfo-3.0.3-5.fc5.x86_64.rpm 547908d63701c29026d4bda11aad298c0f4be761 x86_64/xen-3.0.3-5.fc5.x86_64.rpm 513513621d4fb375f982abfbe5ee78d5bc503094 i386/xen-3.0.3-5.fc5.i386.rpm 5a70730cc08d4bdc342f21e614cbe0d0e240b11c i386/debug/xen-debuginfo-3.0.3-5.fc5.i386.rpm -- Fedora Core 6 -- 1741f962baeb775c9e2519b18aa44e2831c0585f SRPMS/xen-3.0.3-8.fc6.src.rpm 1741f962baeb775c9e2519b18aa44e2831c0585f noarch/xen-3.0.3-8.fc6.src.rpm c384423104620e719c2ae8fa2947ede9f675d4f7 x86_64/debug/xen-debuginfo-3.0.3-8.fc6.x86_64.rpm 9f865fd4ed56c4d35382c51bd00e2019156184c5 x86_64/xen-3.0.3-8.fc6.x86_64.rpm 4b458e342a7a6e54ee4260b2cfe5fa30eceda74f x86_64/xen-libs-3.0.3-8.fc6.x86_64.rpm 1485f0bbde1c4f9cbe5fd591806007409cdc9e5c x86_64/xen-devel-3.0.3-8.fc6.x86_64.rpm e2cac6874e958ec27d6167b23171121b3df08ae9 i386/debug/xen-debuginfo-3.0.3-8.fc6.i386.rpm 435e65f7dd61f4164200f27d72f989571578c288 i386/xen-libs-3.0.3-8.fc6.i386.rpm 6a01404d96baaae8ca45dcd35bc2af6b61dd6f08 i386/xen-devel-3.0.3-8.fc6.i386.rpm 200dc86cf82dc8a7efa6144d037bb52928adf773 i386/xen-3.0.3-8.fc6.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2802 http://fedoranews.org/cms/node/2803 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------