-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4707
                     Citrix Hypervisor Security Update
                             18 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Citrix Hypervisor 8.0
Publisher:         Citrix
Operating System:  Virtualisation
Impact/Access:     Increased Privileges     -- Existing Account
                   Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-19583 CVE-2019-19580 CVE-2019-19577
                   CVE-2019-14607  

Reference:         ESB-2019.4656
                   ESB-2019.4651.2

Original Bulletin: 
   https://support.citrix.com/article/CTX266932

- --------------------------BEGIN INCLUDED TEXT--------------------

Citrix Hypervisor Security Update

Reference: CTX266932

Category : High

Created  : 11 Dec 2019

Modified : 11 Dec 2019

Applicable Products

  o Citrix Hypervisor 8.0
  o XenServer 7.6
  o XenServer 7.1 LTSR Cumulative Update 2
  o XenServer 7.0

Description of Problem

A number of vulnerabilities have been found in Citrix Hypervisor (formerly
Citrix XenServer) that may:

i. Allow the host to be compromised by privileged code in a PV guest VM,

ii. allow unprivileged code in a HVM guest VM to cause that guest to crash and

iii. under certain conditions, allow an HVM guest VM to cause the host to
eventually run out of memory.

These issues have the following identifiers:

o CVE-2019-19580

o CVE-2019-19583

o CVE-2019-19577

In addition, this hotfix contains updated microcode that addresses an issue in
specific Intel CPU hardware that may allow malicious unprivileged code within a
guest VM to compromise that guest VM.

This issue has the following identifier:

o CVE-2019-14607

These issues affect all currently supported versions of Citrix Hypervisor up to
and including Citrix Hypervisor 8.0.

Mitigating Factors

Customers running only HVM workloads are not affected by the host compromise
issue.

Customers who are not running on AMD hardware, or who do not use PCI
Passthrough functionality, are not affected by the memory exhaustion issue.

Not all Intel CPUs are affected by the Intel CPU hardware issue. Details of
which CPUs are affected can be found at: https://www.intel.com/content/www/us/
en/security-center/advisory/intel-sa-00317.html .

What Customers Should Do

Hotfixes have been released to address these issues. Citrix recommends that
affected customers install these hotfixes as their patching schedules allow.
The hotfixes can be downloaded from the following locations:

Citrix Hypervisor 8.0: CTX263620 - https://support.citrix.com/article/CTX263620

Citrix XenServer 7.6: CTX263619 - https://support.citrix.com/article/CTX263619

Citrix XenServer 7.1 LTSR CU2: CTX263618 - https://support.citrix.com/article/
CTX263618

Citrix XenServer 7.0: CTX263617 - https://support.citrix.com/article/CTX263617

Changelog

+-------------------------------------+---------------------------------------+
|Date                                 |Change                                 |
+-------------------------------------+---------------------------------------+
|11th December 2019                   |Initial Publication                    |
+-------------------------------------+---------------------------------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=J1hl
-----END PGP SIGNATURE-----