All the vulnerabilites related to libguestfs - libguestfs
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:39
Severity ?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "77042966-6B71-4BB0-988A-4F3970F4AA4B", "versionEndIncluding": "1.17.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "04515F8E-5A27-4381-B7B7-AADAE47D671E", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D278A56B-B56C-4165-949B-C25FF949ACBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9E0BD26-E67F-47FF-B084-B8E9600E27E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "33A37E2A-DFF4-44B8-A237-D5BFA1E66CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "4407B571-7927-4D6D-9854-4B689AE51E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.5:*:*:*:*:*:*:*", "matchCriteriaId": "C528DB0A-7E43-4442-A0F0-020ED86B40AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.6:*:*:*:*:*:*:*", "matchCriteriaId": "19A03D60-1AA5-4BE4-9A17-ECC5480F3B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.7:*:*:*:*:*:*:*", "matchCriteriaId": "690F95BA-DF60-451C-9444-BDB2AA1BCE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.8:*:*:*:*:*:*:*", "matchCriteriaId": "56E42608-CF94-42F5-81CC-869C49E16F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.9:*:*:*:*:*:*:*", "matchCriteriaId": "4537FB10-6DA6-420F-A92F-64B87A9EFCF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC432530-78E4-4661-ACE1-4DDE24865BA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.11:*:*:*:*:*:*:*", "matchCriteriaId": "D64DEF3A-E7FF-497C-9ACC-888C92AA0F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.12:*:*:*:*:*:*:*", "matchCriteriaId": "04429F65-00DD-4A1C-8494-AEAE1E59C909", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.13:*:*:*:*:*:*:*", "matchCriteriaId": "7D7FBC09-D65D-45F6-8415-782A44C3BEF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.14:*:*:*:*:*:*:*", "matchCriteriaId": "5B5476BB-4A8A-4FF7-8E98-6A36A71EED9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.15:*:*:*:*:*:*:*", "matchCriteriaId": "01C33E77-3452-45DF-94D7-F582FEF9FC27", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.16:*:*:*:*:*:*:*", "matchCriteriaId": "788A9046-8C39-4E73-BE43-37CD6DB5C00C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.17:*:*:*:*:*:*:*", "matchCriteriaId": "DEB97203-5931-4227-B2F0-4E8ADF9AB4F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.18:*:*:*:*:*:*:*", "matchCriteriaId": "9A96D4FC-A451-4826-8687-85AD782B2CA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.19:*:*:*:*:*:*:*", "matchCriteriaId": "009E47DF-6663-471E-8F53-684EE73A37F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.20:*:*:*:*:*:*:*", "matchCriteriaId": "EC2FB7D6-0E16-4AEA-B01F-9FAF420E8BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.21:*:*:*:*:*:*:*", "matchCriteriaId": "8FEE5AD8-C3CD-42C8-8FE9-124BD31E9F06", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.22:*:*:*:*:*:*:*", "matchCriteriaId": "F2660643-C9BC-4C46-B9AB-ED026FDFDBD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.23:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C99B3-5696-4370-80BA-5D3E4E997D49", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.24:*:*:*:*:*:*:*", "matchCriteriaId": "C05F55E2-06F7-400D-8E4A-267F2F9E3231", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.25:*:*:*:*:*:*:*", "matchCriteriaId": "BA0238BB-79F8-487A-8451-A4CF6E54CDE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.26:*:*:*:*:*:*:*", "matchCriteriaId": "10D40F9C-1C7C-43AB-9512-844B65F9BE09", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C25264-F591-487F-A6A0-6A10091EBBD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A11F90A-729A-4152-9829-F98E55056198", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "A649D17E-3F18-4457-9D37-DE5794F52D63", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "BECC2472-1C8B-4910-987B-37E0E76F2A9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "A3C46FEC-6B24-4848-B2F3-D190A2C27797", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.5:*:*:*:*:*:*:*", "matchCriteriaId": "2F923948-F8E4-4DFC-AD6A-E0334C36D5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF2B7A-7EF3-40B2-BAFE-73AED2F9B420", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.7:*:*:*:*:*:*:*", "matchCriteriaId": "D98CCD0B-A7DF-4D96-BE0D-9C3A77784862", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.8:*:*:*:*:*:*:*", "matchCriteriaId": "C79A4E05-93BE-4D6A-AFBD-158509F05F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD9603FA-FBEB-4FAC-90D8-199AF6195BCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9DD9D28E-E8A0-401F-9813-5FA4652322FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.11:*:*:*:*:*:*:*", "matchCriteriaId": "C17AFE4E-83AA-47FB-B8DB-9BD3B8460EA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.12:*:*:*:*:*:*:*", "matchCriteriaId": "8676D4D8-86A4-4BDF-9936-E6A3A75E95D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.13:*:*:*:*:*:*:*", "matchCriteriaId": "5C776C88-7352-4EC3-8C98-D3CE62D73228", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.14:*:*:*:*:*:*:*", "matchCriteriaId": "5B756B1B-7357-4DEB-9B64-D54A79D9B041", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.15:*:*:*:*:*:*:*", "matchCriteriaId": "C1632AF2-7D5B-4972-8D6B-D71BE964CB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.16:*:*:*:*:*:*:*", "matchCriteriaId": "AAC41158-D865-4EA8-8AEE-A58A386E3BD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.17:*:*:*:*:*:*:*", "matchCriteriaId": "87C64452-10CA-4B19-9B35-A65D0D12CD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.18:*:*:*:*:*:*:*", "matchCriteriaId": "E25674C8-966F-40DE-B874-B64E44670030", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.19:*:*:*:*:*:*:*", "matchCriteriaId": "7AE20AFA-1206-4D74-B3FA-54AC85AB5F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.20:*:*:*:*:*:*:*", "matchCriteriaId": "6393B4A7-75B3-432F-907B-827E70AE6E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.21:*:*:*:*:*:*:*", "matchCriteriaId": "C6B472A5-2939-48AB-B70A-049B77E1D9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.22:*:*:*:*:*:*:*", "matchCriteriaId": "5DF8FF77-8B2F-4C94-A410-AD9041555200", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.23:*:*:*:*:*:*:*", "matchCriteriaId": "96F422AD-045F-4551-8F1F-592AA0790063", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.24:*:*:*:*:*:*:*", "matchCriteriaId": "80225C95-1C57-47A7-86DD-AEF853F3C42F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.25:*:*:*:*:*:*:*", "matchCriteriaId": "E92E60EA-F503-4A93-9DC3-FF7CD739C675", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5880437-9C95-4551-8A41-B72C6ABAC4D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.27:*:*:*:*:*:*:*", "matchCriteriaId": "39456795-F23E-4395-9672-ED543714BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.28:*:*:*:*:*:*:*", "matchCriteriaId": "20BC7CC0-7A1B-47EE-8BC4-819E7D0ECEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.29:*:*:*:*:*:*:*", "matchCriteriaId": "2FC526CB-9355-4136-BF5E-7D4539B37A8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.30:*:*:*:*:*:*:*", "matchCriteriaId": "901ABE27-B8B5-4C7A-8840-DE7755470503", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.31:*:*:*:*:*:*:*", "matchCriteriaId": "AAB081F2-D5FE-415B-8055-207716153EC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.32:*:*:*:*:*:*:*", "matchCriteriaId": "27D4F1CF-AAA8-451A-A8D3-A9BC7DC4B76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.33:*:*:*:*:*:*:*", "matchCriteriaId": "DAC716C8-7C76-4556-8424-30C7FD0E7600", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.34:*:*:*:*:*:*:*", "matchCriteriaId": "8A7F8070-3F20-4AA9-A127-11713F5285DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.35:*:*:*:*:*:*:*", "matchCriteriaId": "29CF4E43-ACFD-4CC2-ACA9-BB60BF241794", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.36:*:*:*:*:*:*:*", "matchCriteriaId": "7167DDD4-E322-4C46-93E3-C3A9B6BEF96C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.37:*:*:*:*:*:*:*", "matchCriteriaId": "63CA35DE-EC4D-4642-A7F1-049CF888D57D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.38:*:*:*:*:*:*:*", "matchCriteriaId": "F73D4FDA-B905-43CF-9F7B-B80C09FEF79C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.39:*:*:*:*:*:*:*", "matchCriteriaId": "15153731-A1E9-4A6E-84B3-363AAD6B9DF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.40:*:*:*:*:*:*:*", "matchCriteriaId": "BFF89A01-FC64-4514-916E-0749EC68F6E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.41:*:*:*:*:*:*:*", "matchCriteriaId": "937BBF4B-4809-4EE8-AE4F-D1FE12B532FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.42:*:*:*:*:*:*:*", "matchCriteriaId": "67FF7B70-98D6-40CC-806D-0169CEBB9929", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information." }, { "lang": "es", "value": "virt-edit de libguestfs anteriores a 1.18.0 no conserva los permisos del archivo original y guarda el nuevo fichero con permisos de lectura para otros al editar, lo que puede permitir a usuarios locales inviados obtener informaci\u00f3n confidencial." } ], "id": "CVE-2012-2690", "lastModified": "2024-11-21T01:39:27.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-29T19:55:04.000", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49431" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49545" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53932" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-11-04 18:00
Modified
2024-11-21 01:19
Severity ?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libguestfs | libguestfs | * | |
libguestfs | libguestfs | 1.5.0 | |
libguestfs | libguestfs | 1.5.1 | |
libguestfs | libguestfs | 1.5.2 | |
libguestfs | libguestfs | 1.5.3 | |
libguestfs | libguestfs | 1.5.4 | |
libguestfs | libguestfs | 1.5.5 | |
libguestfs | libguestfs | 1.5.6 | |
libguestfs | libguestfs | 1.5.7 | |
libguestfs | libguestfs | 1.5.8 | |
libguestfs | libguestfs | 1.5.9 | |
libguestfs | libguestfs | 1.5.10 | |
libguestfs | libguestfs | 1.5.11 | |
libguestfs | libguestfs | 1.5.12 | |
libguestfs | libguestfs | 1.5.13 | |
libguestfs | libguestfs | 1.5.14 | |
libguestfs | libguestfs | 1.5.15 | |
libguestfs | libguestfs | 1.5.16 | |
libguestfs | libguestfs | 1.5.17 | |
libguestfs | libguestfs | 1.5.18 | |
libguestfs | libguestfs | 1.5.19 | |
libguestfs | libguestfs | 1.5.20 | |
libguestfs | libguestfs | 1.5.21 | |
matthew_booth | virt-v2v | * | |
richard_jones | virt-inspector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4E2996B-8A3E-4AA0-A608-E139BBA5504E", "versionEndIncluding": "1.5.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7DA99331-E185-467D-BDBC-5E18EBF56C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "17AA91C9-BD8B-477C-9DE2-37F44CBA6450", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "82E79577-A638-46DF-A47D-249E85E74C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "52231A57-0344-482A-BED8-5F4A9EBFA713", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E48B2379-3CEA-4A58-AEA4-2328868F5339", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "51E57163-94B3-4709-88A8-7139C531804F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "54368743-2B14-4B24-AC41-D4252D892468", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "772290ED-6A09-477A-AFBA-14F901930015", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "526A7F38-E24F-4550-912A-142B858848F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "55756BFD-70AC-4CB5-847C-13AE2F934332", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "6ED35292-D610-4061-8E64-6EDCD6D92810", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "29CE04FB-3F72-427F-A912-55C9DFA34558", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC0D7435-8AEA-4D14-AA28-1E93B2CCAFA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "34EF36A0-E668-4565-92C5-1F7C48682CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "304BA946-0566-4E29-A6F6-A7BA0E17EE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "07866880-6171-4ADB-8438-21E7E77C5E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "99D74570-DF29-4F69-B94E-C51DE53E8C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "318EA742-A43B-4EA1-A3C8-3322498C1E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "4D5D6136-D050-49C6-9C06-922C6A692A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "A541A9C5-EDBA-48D2-9B7E-351D0DEA06EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "9FB4834F-02D2-4AA3-A4A8-DC0C6E7DEFBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "472FFF3B-FDC8-499D-98C0-5857BF8B404F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:matthew_booth:virt-v2v:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0CDFDB5-535A-4ED4-BD04-A9D4A6D30584", "vulnerable": false }, { "criteria": "cpe:2.3:a:richard_jones:virt-inspector:*:*:*:*:*:*:*:*", "matchCriteriaId": "18AD5175-788D-407A-89D4-E98D82EFA293", "versionEndIncluding": "1.5.3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier." }, { "lang": "es", "value": "libguestfs anterior a v1.5.23, que se utiliza en virt-V2V, virt-inspector v1.5.3 y anteriores, y posiblemente otros productos, cuando una imagen de disco sin formato se utiliza, permite a administradores locales del sistema operativo leer archivos desde el host mediante un (1) qcow2, (2) VMDK, o (3) VDI header manipulado, relacionados con la falta de apoyo de un especificador de formato de disco." } ], "id": "CVE-2010-3851", "lastModified": "2024-11-21T01:19:45.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-11-04T18:00:02.767", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html" }, { "source": "secalert@redhat.com", "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41797" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42235" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/44166" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2874" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2010/2963" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/44166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-27 14:55
Modified
2024-11-21 01:51
Severity ?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "662D8743-9FBE-4048-8511-6C9AF4193706", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6CEAA548-615C-4B5B-9E2C-7E65620EEFE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "9825024C-F3AD-4B76-8B43-B6F78DB0B3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6A1FC10-0A20-4EA6-94D5-34629D059E03", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.4:*:*:*:*:*:*:*", "matchCriteriaId": "B688FBA6-1892-4EDC-A049-E90867EC4EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.5:*:*:*:*:*:*:*", "matchCriteriaId": "ACA9267E-D50E-4AE9-873C-C07797E4B8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.6:*:*:*:*:*:*:*", "matchCriteriaId": "02DF3922-A28E-4CFA-9907-2FAED0D72029", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "A13F7320-1B55-4814-A098-940D21A462F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D27A0A05-6482-4B3F-A4A4-B1E0F82885DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D91BEF4-301D-4A74-8C43-697B23B2E8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.4:*:*:*:*:*:*:*", "matchCriteriaId": "4A76C10D-BD16-443D-9A7D-8938AAC6552C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A12C8F3-C5B2-43ED-B729-FD51DE870952", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A57EF2D-E4C8-46A7-8889-349091EDE1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE39222C-BEAA-428D-A165-44DB34F79F9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.8:*:*:*:*:*:*:*", "matchCriteriaId": "09A64839-3B75-404C-A48F-3D5784627303", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.9:*:*:*:*:*:*:*", "matchCriteriaId": "8B126466-0774-43AD-9A16-74B3681AFEF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.10:*:*:*:*:*:*:*", "matchCriteriaId": "B5315942-D14F-4D2A-BDA5-B4885C090784", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.11:*:*:*:*:*:*:*", "matchCriteriaId": "5F7DCCBA-7340-49BC-8123-3539AA1B9BAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.12:*:*:*:*:*:*:*", "matchCriteriaId": "672D8506-6DC4-4E40-8843-FCB22212EBC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.13:*:*:*:*:*:*:*", "matchCriteriaId": "013A015E-AE93-44AE-991E-034DF06AE079", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.14:*:*:*:*:*:*:*", "matchCriteriaId": "AEA156D2-8AB4-477F-A75E-6BAB37361955", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.15:*:*:*:*:*:*:*", "matchCriteriaId": "C9147F40-98D4-44B3-8FF5-DAB43BC23759", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.16:*:*:*:*:*:*:*", "matchCriteriaId": "F71EDD82-6320-4A68-9107-0436887BD86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.17:*:*:*:*:*:*:*", "matchCriteriaId": "5E37E1CF-3969-483C-B68F-8A42E65DB050", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.18:*:*:*:*:*:*:*", "matchCriteriaId": "51693632-CFAB-466C-B0A0-49257871BA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.19:*:*:*:*:*:*:*", "matchCriteriaId": "0EA5DE95-07D8-4DB2-91CE-C7DE34E0D603", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.20:*:*:*:*:*:*:*", "matchCriteriaId": "3E39349B-5656-4989-96E2-EF0351C582E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.21:*:*:*:*:*:*:*", "matchCriteriaId": "8B72D9E7-A1D4-4273-A7F1-FECB74D3AFE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.22:*:*:*:*:*:*:*", "matchCriteriaId": "2B23A55A-9E76-4ED6-8327-2F6362813C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.23:*:*:*:*:*:*:*", "matchCriteriaId": "9C4AD1A3-962B-4575-A8A6-BAADB193D352", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.24:*:*:*:*:*:*:*", "matchCriteriaId": "9B1F3731-012A-4323-9000-153105F4B5C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.25:*:*:*:*:*:*:*", "matchCriteriaId": "F71207B8-E4BD-403D-8C0E-01E57179A3F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.26:*:*:*:*:*:*:*", "matchCriteriaId": "16F95FE6-A5A2-4F96-8AAE-A478E0C5E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.27:*:*:*:*:*:*:*", "matchCriteriaId": "96C11574-11A3-408F-B84F-AC9D6C3A7D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.28:*:*:*:*:*:*:*", "matchCriteriaId": "01AFC167-0E2E-4EA7-B7E6-DFBB947EEE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.29:*:*:*:*:*:*:*", "matchCriteriaId": "44D1FD90-C5CD-454E-A233-D979E118F20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.30:*:*:*:*:*:*:*", "matchCriteriaId": "39F723F4-5261-4BEE-BDD7-5E8B86E220EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.31:*:*:*:*:*:*:*", "matchCriteriaId": "0EFFBA88-0803-4FA1-B94E-98EA4542071E", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.32:*:*:*:*:*:*:*", "matchCriteriaId": "34208517-5E4C-42BA-9D85-76DC55FD10BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.33:*:*:*:*:*:*:*", "matchCriteriaId": "E7E9392B-178B-41DF-B7EA-146DF22301B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.34:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E45B3-14CF-44D4-B64B-4C07B726ADC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.35:*:*:*:*:*:*:*", "matchCriteriaId": "7E354617-F38F-4982-B418-FB3F6DD7E215", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.36:*:*:*:*:*:*:*", "matchCriteriaId": "FCC2A523-707B-4F0A-8ACD-2951C6C269BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.37:*:*:*:*:*:*:*", "matchCriteriaId": "62216E2C-7A84-4F4D-92CC-EC32EECE7B82", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.38:*:*:*:*:*:*:*", "matchCriteriaId": "B523AB06-16E6-4F6C-B96A-F705550AACC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.39:*:*:*:*:*:*:*", "matchCriteriaId": "F7198CD5-595C-4DB2-AC26-218DF2005CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.40:*:*:*:*:*:*:*", "matchCriteriaId": "B8080CA6-AE70-43A7-8F76-0B316DD876A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "D05D11AF-F047-4072-892F-A93C702A94EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "E484129B-92AD-4A85-845F-4944BDBCF87A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files." }, { "lang": "es", "value": "Vulnerabilidad de doble liberaci\u00f3n en inspect-fs.c en LibguestFS 1.20.x anterior a 1.20.7, 1.21.x, 1.22.0 y 1.23.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de archivos de invitados vac\u00edos." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/415.html\n\n\"CWE-415: Double Free\"", "id": "CVE-2013-2124", "lastModified": "2024-11-21T01:51:05.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-27T14:55:06.870", "references": [ { "source": "secalert@redhat.com", "url": "http://osvdb.org/93724" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://seclists.org/oss-sec/2013/q2/431" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/60205" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/93724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seclists.org/oss-sec/2013/q2/431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/60205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-12 21:15
Modified
2024-11-21 07:00
Severity ?
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-2211 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-2211 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libguestfs | libguestfs | - | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libguestfs:libguestfs:-:*:*:*:*:*:*:*", "matchCriteriaId": "677F1ADC-0BEE-4E74-8C34-1036E53945A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en libguestfs. Este problema es producido al calcular el mayor n\u00famero posible de claves coincidentes en la funci\u00f3n get_keys(). Este fallo conlleva a una denegaci\u00f3n de servicio, ya sea por error o por un actor malicioso" } ], "id": "CVE-2022-2211", "lastModified": "2024-11-21T07:00:32.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-12T21:15:09.800", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2211" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-11-05 20:55
Modified
2024-11-21 01:55
Severity ?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libguestfs | libguestfs | * | |
libguestfs | libguestfs | * | |
suse | suse_linux_enterprise_software_development_kit | 11.0 | |
novell | suse_linux_enterprise_server | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDCD7E8-EB02-4686-8217-017306C55D52", "versionEndIncluding": "1.20.12", "versionStartIncluding": "1.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "78562C81-E443-418F-BD73-29CA55F6F098", "versionEndIncluding": "1.22.7", "versionStartIncluding": "1.22.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "C3407560-6D54-4B1B-9977-AD4F6EB5D6BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "623DB4CD-8CB3-445A-B9B5-1238CF195235", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance." }, { "lang": "es", "value": "El comando guestfish en libguestfs 1.20.12, 1.22.7 y anteriores versiones, cuando se usa la opci\u00f3n --remote o --listen, no comprueba adecuadamente la propiedad de /tmp/.guestfish-$UID/ al crear un archivo de socket temporal en este directorio, lo que permite a usuarios locales escribir en el socket y ejecutar comandos arbitrarios mediante la creaci\u00f3n de /tmp/.guestfish-$UID/ por adelantado." } ], "id": "CVE-2013-4419", "lastModified": "2024-11-21T01:55:31.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.2, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-11-05T20:55:29.397", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55813" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-2211
Vulnerability from cvelistv5
Published
2022-07-12 20:33
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/security/cve/CVE-2022-2211 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | libguestfs |
Version: none |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:08.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2211" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libguestfs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "none" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-12T20:33:33", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2211" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-2211", "datePublished": "2022-07-12T20:33:33", "dateReserved": "2022-06-27T00:00:00", "dateUpdated": "2024-08-03T00:32:08.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2690
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 19:42
Severity ?
EPSS score ?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49545 | third-party-advisory, x_refsource_SECUNIA | |
https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/53932 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/76220 | vdb-entry, x_refsource_XF | |
http://rhn.redhat.com/errata/RHSA-2012-0774.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/49431 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:32.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49545", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49545" }, { "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html" }, { "name": "53932", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53932" }, { "name": "libguestfs-virtedit-info-disc(76220)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220" }, { "name": "RHSA-2012:0774", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html" }, { "name": "49431", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49431" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "49545", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49545" }, { "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html" }, { "name": "53932", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53932" }, { "name": "libguestfs-virtedit-info-disc(76220)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220" }, { "name": "RHSA-2012:0774", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html" }, { "name": "49431", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49431" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2690", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:32.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3851
Vulnerability from cvelistv5
Published
2010-11-04 17:00
Modified
2024-08-07 03:26
Severity ?
EPSS score ?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:11.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/" }, { "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html" }, { "name": "FEDORA-2010-16835", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html" }, { "name": "FEDORA-2010-17202", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html" }, { "name": "ADV-2010-2963", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2963" }, { "name": "RHSA-2011:0586", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html" }, { "name": "44166", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44166" }, { "name": "41797", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41797" }, { "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html" }, { "name": "42235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42235" }, { "name": "ADV-2010-2874", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2874" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-18T00:00:00", "descriptions": [ { "lang": "en", "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-25T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/" }, { "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html" }, { "name": "FEDORA-2010-16835", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html" }, { "name": "FEDORA-2010-17202", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html" }, { "name": "ADV-2010-2963", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2963" }, { "name": "RHSA-2011:0586", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html" }, { "name": "44166", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44166" }, { "name": "41797", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41797" }, { "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html" }, { "name": "42235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42235" }, { "name": "ADV-2010-2874", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2874" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3851", "datePublished": "2010-11-04T17:00:00", "dateReserved": "2010-10-08T00:00:00", "dateUpdated": "2024-08-07T03:26:11.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2124
Vulnerability from cvelistv5
Published
2014-05-27 15:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q2/431 | mailing-list, x_refsource_MLIST | |
https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85145 | vdb-entry, x_refsource_XF | |
https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html | mailing-list, x_refsource_MLIST | |
https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html | mailing-list, x_refsource_MLIST | |
http://osvdb.org/93724 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/60205 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q2/431" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd" }, { "name": "libguestfs-cve20132124-inspectfs-dos(85145)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145" }, { "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html" }, { "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html" }, { "name": "93724", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/93724" }, { "name": "60205", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60205" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q2/431" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd" }, { "name": "libguestfs-cve20132124-inspectfs-dos(85145)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145" }, { "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html" }, { "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html" }, { "name": "93724", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/93724" }, { "name": "60205", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60205" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2124", "datePublished": "2014-05-27T15:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4419
Vulnerability from cvelistv5
Published
2013-11-05 20:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1536.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/55813 | third-party-advisory, x_refsource_SECUNIA | |
https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1016960 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2013:1536", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html" }, { "name": "55813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55813" }, { "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960" }, { "name": "SUSE-SU-2013:1626", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-07T20:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2013:1536", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html" }, { "name": "55813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55813" }, { "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960" }, { "name": "SUSE-SU-2013:1626", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2013:1536", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html" }, { "name": "55813", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55813" }, { "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket", "refsource": "MLIST", "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960" }, { "name": "SUSE-SU-2013:1626", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4419", "datePublished": "2013-11-05T20:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }