All the vulnerabilites related to libguestfs - libguestfs
Vulnerability from fkie_nvd
Published
2012-06-29 19:55
Modified
2024-11-21 01:39
Severity ?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
Impacted products
Vendor Product Version
libguestfs libguestfs *
libguestfs libguestfs 1.16.0
libguestfs libguestfs 1.16.1
libguestfs libguestfs 1.16.2
libguestfs libguestfs 1.16.3
libguestfs libguestfs 1.16.4
libguestfs libguestfs 1.16.5
libguestfs libguestfs 1.16.6
libguestfs libguestfs 1.16.7
libguestfs libguestfs 1.16.8
libguestfs libguestfs 1.16.9
libguestfs libguestfs 1.16.10
libguestfs libguestfs 1.16.11
libguestfs libguestfs 1.16.12
libguestfs libguestfs 1.16.13
libguestfs libguestfs 1.16.14
libguestfs libguestfs 1.16.15
libguestfs libguestfs 1.16.16
libguestfs libguestfs 1.16.17
libguestfs libguestfs 1.16.18
libguestfs libguestfs 1.16.19
libguestfs libguestfs 1.16.20
libguestfs libguestfs 1.16.21
libguestfs libguestfs 1.16.22
libguestfs libguestfs 1.16.23
libguestfs libguestfs 1.16.24
libguestfs libguestfs 1.16.25
libguestfs libguestfs 1.16.26
libguestfs libguestfs 1.17.0
libguestfs libguestfs 1.17.1
libguestfs libguestfs 1.17.2
libguestfs libguestfs 1.17.3
libguestfs libguestfs 1.17.4
libguestfs libguestfs 1.17.5
libguestfs libguestfs 1.17.6
libguestfs libguestfs 1.17.7
libguestfs libguestfs 1.17.8
libguestfs libguestfs 1.17.9
libguestfs libguestfs 1.17.10
libguestfs libguestfs 1.17.11
libguestfs libguestfs 1.17.12
libguestfs libguestfs 1.17.13
libguestfs libguestfs 1.17.14
libguestfs libguestfs 1.17.15
libguestfs libguestfs 1.17.16
libguestfs libguestfs 1.17.17
libguestfs libguestfs 1.17.18
libguestfs libguestfs 1.17.19
libguestfs libguestfs 1.17.20
libguestfs libguestfs 1.17.21
libguestfs libguestfs 1.17.22
libguestfs libguestfs 1.17.23
libguestfs libguestfs 1.17.24
libguestfs libguestfs 1.17.25
libguestfs libguestfs 1.17.26
libguestfs libguestfs 1.17.27
libguestfs libguestfs 1.17.28
libguestfs libguestfs 1.17.29
libguestfs libguestfs 1.17.30
libguestfs libguestfs 1.17.31
libguestfs libguestfs 1.17.32
libguestfs libguestfs 1.17.33
libguestfs libguestfs 1.17.34
libguestfs libguestfs 1.17.35
libguestfs libguestfs 1.17.36
libguestfs libguestfs 1.17.37
libguestfs libguestfs 1.17.38
libguestfs libguestfs 1.17.39
libguestfs libguestfs 1.17.40
libguestfs libguestfs 1.17.41
libguestfs libguestfs 1.17.42



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77042966-6B71-4BB0-988A-4F3970F4AA4B",
              "versionEndIncluding": "1.17.43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04515F8E-5A27-4381-B7B7-AADAE47D671E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D278A56B-B56C-4165-949B-C25FF949ACBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E0BD26-E67F-47FF-B084-B8E9600E27E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A37E2A-DFF4-44B8-A237-D5BFA1E66CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4407B571-7927-4D6D-9854-4B689AE51E1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C528DB0A-7E43-4442-A0F0-020ED86B40AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A03D60-1AA5-4BE4-9A17-ECC5480F3B55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "690F95BA-DF60-451C-9444-BDB2AA1BCE3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E42608-CF94-42F5-81CC-869C49E16F25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4537FB10-6DA6-420F-A92F-64B87A9EFCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC432530-78E4-4661-ACE1-4DDE24865BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64DEF3A-E7FF-497C-9ACC-888C92AA0F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04429F65-00DD-4A1C-8494-AEAE1E59C909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7FBC09-D65D-45F6-8415-782A44C3BEF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B5476BB-4A8A-4FF7-8E98-6A36A71EED9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "01C33E77-3452-45DF-94D7-F582FEF9FC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "788A9046-8C39-4E73-BE43-37CD6DB5C00C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB97203-5931-4227-B2F0-4E8ADF9AB4F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A96D4FC-A451-4826-8687-85AD782B2CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "009E47DF-6663-471E-8F53-684EE73A37F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2FB7D6-0E16-4AEA-B01F-9FAF420E8BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEE5AD8-C3CD-42C8-8FE9-124BD31E9F06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2660643-C9BC-4C46-B9AB-ED026FDFDBD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9C99B3-5696-4370-80BA-5D3E4E997D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F55E2-06F7-400D-8E4A-267F2F9E3231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA0238BB-79F8-487A-8451-A4CF6E54CDE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D40F9C-1C7C-43AB-9512-844B65F9BE09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C25264-F591-487F-A6A0-6A10091EBBD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A11F90A-729A-4152-9829-F98E55056198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A649D17E-3F18-4457-9D37-DE5794F52D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BECC2472-1C8B-4910-987B-37E0E76F2A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C46FEC-6B24-4848-B2F3-D190A2C27797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F923948-F8E4-4DFC-AD6A-E0334C36D5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5FF2B7A-7EF3-40B2-BAFE-73AED2F9B420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98CCD0B-A7DF-4D96-BE0D-9C3A77784862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79A4E05-93BE-4D6A-AFBD-158509F05F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9603FA-FBEB-4FAC-90D8-199AF6195BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD9D28E-E8A0-401F-9813-5FA4652322FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17AFE4E-83AA-47FB-B8DB-9BD3B8460EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8676D4D8-86A4-4BDF-9936-E6A3A75E95D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C776C88-7352-4EC3-8C98-D3CE62D73228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B756B1B-7357-4DEB-9B64-D54A79D9B041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1632AF2-7D5B-4972-8D6B-D71BE964CB12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC41158-D865-4EA8-8AEE-A58A386E3BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C64452-10CA-4B19-9B35-A65D0D12CD1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25674C8-966F-40DE-B874-B64E44670030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE20AFA-1206-4D74-B3FA-54AC85AB5F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6393B4A7-75B3-432F-907B-827E70AE6E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6B472A5-2939-48AB-B70A-049B77E1D9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF8FF77-8B2F-4C94-A410-AD9041555200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F422AD-045F-4551-8F1F-592AA0790063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "80225C95-1C57-47A7-86DD-AEF853F3C42F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92E60EA-F503-4A93-9DC3-FF7CD739C675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5880437-9C95-4551-8A41-B72C6ABAC4D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "39456795-F23E-4395-9672-ED543714BBD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "20BC7CC0-7A1B-47EE-8BC4-819E7D0ECEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC526CB-9355-4136-BF5E-7D4539B37A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "901ABE27-B8B5-4C7A-8840-DE7755470503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB081F2-D5FE-415B-8055-207716153EC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D4F1CF-AAA8-451A-A8D3-A9BC7DC4B76D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC716C8-7C76-4556-8424-30C7FD0E7600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A7F8070-3F20-4AA9-A127-11713F5285DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CF4E43-ACFD-4CC2-ACA9-BB60BF241794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7167DDD4-E322-4C46-93E3-C3A9B6BEF96C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CA35DE-EC4D-4642-A7F1-049CF888D57D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73D4FDA-B905-43CF-9F7B-B80C09FEF79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "15153731-A1E9-4A6E-84B3-363AAD6B9DF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF89A01-FC64-4514-916E-0749EC68F6E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "937BBF4B-4809-4EE8-AE4F-D1FE12B532FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "67FF7B70-98D6-40CC-806D-0169CEBB9929",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information."
    },
    {
      "lang": "es",
      "value": "virt-edit de libguestfs anteriores a 1.18.0 no conserva los permisos del archivo original y guarda el nuevo fichero con permisos de lectura para otros al editar, lo que puede permitir a usuarios locales inviados obtener informaci\u00f3n confidencial."
    }
  ],
  "id": "CVE-2012-2690",
  "lastModified": "2024-11-21T01:39:27.230",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-29T19:55:04.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49431"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49545"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53932"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-11-04 18:00
Modified
2024-11-21 01:19
Severity ?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.htmlPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html
secalert@redhat.comhttp://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/
secalert@redhat.comhttp://secunia.com/advisories/41797Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/42235
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-0586.html
secalert@redhat.comhttp://www.securityfocus.com/bid/44166
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2874Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2963
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=643958
secalert@redhat.comhttps://www.redhat.com/archives/libguestfs/2010-October/msg00036.html
secalert@redhat.comhttps://www.redhat.com/archives/libguestfs/2010-October/msg00037.html
secalert@redhat.comhttps://www.redhat.com/archives/libguestfs/2010-October/msg00041.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html
af854a3a-2127-422b-91ae-364da2661108http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41797Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42235
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0586.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/44166
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2874Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2963
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=643958
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/libguestfs/2010-October/msg00041.htmlPatch



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E2996B-8A3E-4AA0-A608-E139BBA5504E",
              "versionEndIncluding": "1.5.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DA99331-E185-467D-BDBC-5E18EBF56C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17AA91C9-BD8B-477C-9DE2-37F44CBA6450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E79577-A638-46DF-A47D-249E85E74C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "52231A57-0344-482A-BED8-5F4A9EBFA713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E48B2379-3CEA-4A58-AEA4-2328868F5339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E57163-94B3-4709-88A8-7139C531804F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "54368743-2B14-4B24-AC41-D4252D892468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "772290ED-6A09-477A-AFBA-14F901930015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "526A7F38-E24F-4550-912A-142B858848F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "55756BFD-70AC-4CB5-847C-13AE2F934332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ED35292-D610-4061-8E64-6EDCD6D92810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CE04FB-3F72-427F-A912-55C9DFA34558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0D7435-8AEA-4D14-AA28-1E93B2CCAFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EF36A0-E668-4565-92C5-1F7C48682CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "304BA946-0566-4E29-A6F6-A7BA0E17EE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "07866880-6171-4ADB-8438-21E7E77C5E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D74570-DF29-4F69-B94E-C51DE53E8C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "318EA742-A43B-4EA1-A3C8-3322498C1E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5D6136-D050-49C6-9C06-922C6A692A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541A9C5-EDBA-48D2-9B7E-351D0DEA06EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB4834F-02D2-4AA3-A4A8-DC0C6E7DEFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "472FFF3B-FDC8-499D-98C0-5857BF8B404F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:matthew_booth:virt-v2v:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CDFDB5-535A-4ED4-BD04-A9D4A6D30584",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:richard_jones:virt-inspector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18AD5175-788D-407A-89D4-E98D82EFA293",
              "versionEndIncluding": "1.5.3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier."
    },
    {
      "lang": "es",
      "value": "libguestfs anterior a v1.5.23, que se utiliza en virt-V2V, virt-inspector v1.5.3 y anteriores, y posiblemente otros productos, cuando una imagen de disco sin formato se utiliza, permite a administradores locales del sistema operativo leer archivos desde el host mediante un (1) qcow2, (2) VMDK, o (3) VDI header manipulado, relacionados con la falta de apoyo de un especificador de formato de disco."
    }
  ],
  "id": "CVE-2010-3851",
  "lastModified": "2024-11-21T01:19:45.247",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-11-04T18:00:02.767",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41797"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/42235"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/44166"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2874"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/2963"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/44166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/2963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-27 14:55
Modified
2024-11-21 01:51
Severity ?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "662D8743-9FBE-4048-8511-6C9AF4193706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEAA548-615C-4B5B-9E2C-7E65620EEFE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825024C-F3AD-4B76-8B43-B6F78DB0B3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A1FC10-0A20-4EA6-94D5-34629D059E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B688FBA6-1892-4EDC-A049-E90867EC4EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA9267E-D50E-4AE9-873C-C07797E4B8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "02DF3922-A28E-4CFA-9907-2FAED0D72029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13F7320-1B55-4814-A098-940D21A462F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27A0A05-6482-4B3F-A4A4-B1E0F82885DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D91BEF4-301D-4A74-8C43-697B23B2E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A76C10D-BD16-443D-9A7D-8938AAC6552C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A12C8F3-C5B2-43ED-B729-FD51DE870952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A57EF2D-E4C8-46A7-8889-349091EDE1B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE39222C-BEAA-428D-A165-44DB34F79F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "09A64839-3B75-404C-A48F-3D5784627303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B126466-0774-43AD-9A16-74B3681AFEF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5315942-D14F-4D2A-BDA5-B4885C090784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7DCCBA-7340-49BC-8123-3539AA1B9BAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "672D8506-6DC4-4E40-8843-FCB22212EBC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "013A015E-AE93-44AE-991E-034DF06AE079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEA156D2-8AB4-477F-A75E-6BAB37361955",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9147F40-98D4-44B3-8FF5-DAB43BC23759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71EDD82-6320-4A68-9107-0436887BD86B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E37E1CF-3969-483C-B68F-8A42E65DB050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51693632-CFAB-466C-B0A0-49257871BA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA5DE95-07D8-4DB2-91CE-C7DE34E0D603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E39349B-5656-4989-96E2-EF0351C582E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B72D9E7-A1D4-4273-A7F1-FECB74D3AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B23A55A-9E76-4ED6-8327-2F6362813C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C4AD1A3-962B-4575-A8A6-BAADB193D352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1F3731-012A-4323-9000-153105F4B5C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71207B8-E4BD-403D-8C0E-01E57179A3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F95FE6-A5A2-4F96-8AAE-A478E0C5E2B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C11574-11A3-408F-B84F-AC9D6C3A7D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AFC167-0E2E-4EA7-B7E6-DFBB947EEE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D1FD90-C5CD-454E-A233-D979E118F20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F723F4-5261-4BEE-BDD7-5E8B86E220EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFFBA88-0803-4FA1-B94E-98EA4542071E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "34208517-5E4C-42BA-9D85-76DC55FD10BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E9392B-178B-41DF-B7EA-146DF22301B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF4E45B3-14CF-44D4-B64B-4C07B726ADC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E354617-F38F-4982-B418-FB3F6DD7E215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC2A523-707B-4F0A-8ACD-2951C6C269BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "62216E2C-7A84-4F4D-92CC-EC32EECE7B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B523AB06-16E6-4F6C-B96A-F705550AACC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7198CD5-595C-4DB2-AC26-218DF2005CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8080CA6-AE70-43A7-8F76-0B316DD876A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D05D11AF-F047-4072-892F-A93C702A94EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484129B-92AD-4A85-845F-4944BDBCF87A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de doble liberaci\u00f3n en inspect-fs.c en LibguestFS 1.20.x anterior a 1.20.7, 1.21.x, 1.22.0 y 1.23.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de archivos de invitados vac\u00edos."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/415.html\n\n\"CWE-415: Double Free\"",
  "id": "CVE-2013-2124",
  "lastModified": "2024-11-21T01:51:05.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-27T14:55:06.870",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/93724"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://seclists.org/oss-sec/2013/q2/431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/60205"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/93724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seclists.org/oss-sec/2013/q2/431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/60205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-12 21:15
Modified
2024-11-21 07:00
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "677F1ADC-0BEE-4E74-8C34-1036E53945A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
              "matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
              "matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una vulnerabilidad en libguestfs. Este problema es producido al calcular el mayor n\u00famero posible de claves coincidentes en la funci\u00f3n get_keys(). Este fallo conlleva a una denegaci\u00f3n de servicio, ya sea por error o por un actor malicioso"
    }
  ],
  "id": "CVE-2022-2211",
  "lastModified": "2024-11-21T07:00:32.703",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-12T21:15:09.800",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-11-05 20:55
Modified
2024-11-21 01:55
Severity ?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDCD7E8-EB02-4686-8217-017306C55D52",
              "versionEndIncluding": "1.20.12",
              "versionStartIncluding": "1.20.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78562C81-E443-418F-BD73-29CA55F6F098",
              "versionEndIncluding": "1.22.7",
              "versionStartIncluding": "1.22.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "C3407560-6D54-4B1B-9977-AD4F6EB5D6BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "623DB4CD-8CB3-445A-B9B5-1238CF195235",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
    },
    {
      "lang": "es",
      "value": "El comando guestfish en libguestfs 1.20.12, 1.22.7 y anteriores versiones, cuando se usa la opci\u00f3n --remote o --listen, no comprueba adecuadamente la propiedad de /tmp/.guestfish-$UID/ al crear un archivo de socket temporal en este directorio, lo que permite a usuarios locales escribir en el socket y ejecutar comandos arbitrarios mediante la creaci\u00f3n de /tmp/.guestfish-$UID/ por adelantado."
    }
  ],
  "id": "CVE-2013-4419",
  "lastModified": "2024-11-21T01:55:31.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.2,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-05T20:55:29.397",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/55813"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/55813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2022-2211
Vulnerability from cvelistv5
Published
2022-07-12 20:33
Modified
2024-08-03 00:32
Severity ?
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:32:08.724Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libguestfs",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "none"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Buffer Overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-12T20:33:33",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-2211",
    "datePublished": "2022-07-12T20:33:33",
    "dateReserved": "2022-06-27T00:00:00",
    "dateUpdated": "2024-08-03T00:32:08.724Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2690
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 19:42
Severity ?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
References
http://secunia.com/advisories/49545third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/libguestfs/2012-May/msg00104.htmlmailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/53932vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/76220vdb-entry, x_refsource_XF
http://rhn.redhat.com/errata/RHSA-2012-0774.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/49431third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49545"
          },
          {
            "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
          },
          {
            "name": "53932",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53932"
          },
          {
            "name": "libguestfs-virtedit-info-disc(76220)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
          },
          {
            "name": "RHSA-2012:0774",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
          },
          {
            "name": "49431",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49431"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "49545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49545"
        },
        {
          "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
        },
        {
          "name": "53932",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53932"
        },
        {
          "name": "libguestfs-virtedit-info-disc(76220)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
        },
        {
          "name": "RHSA-2012:0774",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
        },
        {
          "name": "49431",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49431"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2690",
    "datePublished": "2012-06-29T19:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3851
Vulnerability from cvelistv5
Published
2010-11-04 17:00
Modified
2024-08-07 03:26
Severity ?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
          },
          {
            "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
          },
          {
            "name": "FEDORA-2010-16835",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
          },
          {
            "name": "FEDORA-2010-17202",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
          },
          {
            "name": "ADV-2010-2963",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2963"
          },
          {
            "name": "RHSA-2011:0586",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
          },
          {
            "name": "44166",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/44166"
          },
          {
            "name": "41797",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41797"
          },
          {
            "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
          },
          {
            "name": "42235",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42235"
          },
          {
            "name": "ADV-2010-2874",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2874"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-25T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
        },
        {
          "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
        },
        {
          "name": "FEDORA-2010-16835",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
        },
        {
          "name": "FEDORA-2010-17202",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
        },
        {
          "name": "ADV-2010-2963",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2963"
        },
        {
          "name": "RHSA-2011:0586",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
        },
        {
          "name": "44166",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/44166"
        },
        {
          "name": "41797",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41797"
        },
        {
          "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
        },
        {
          "name": "42235",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42235"
        },
        {
          "name": "ADV-2010-2874",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2874"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-3851",
    "datePublished": "2010-11-04T17:00:00",
    "dateReserved": "2010-10-08T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-2124
Vulnerability from cvelistv5
Published
2014-05-27 15:00
Modified
2024-08-06 15:27
Severity ?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:27:40.656Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q2/431"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
          },
          {
            "name": "libguestfs-cve20132124-inspectfs-dos(85145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
          },
          {
            "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
          },
          {
            "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
          },
          {
            "name": "93724",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/93724"
          },
          {
            "name": "60205",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/60205"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q2/431"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
        },
        {
          "name": "libguestfs-cve20132124-inspectfs-dos(85145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
        },
        {
          "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
        },
        {
          "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
        },
        {
          "name": "93724",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/93724"
        },
        {
          "name": "60205",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/60205"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2124",
    "datePublished": "2014-05-27T15:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:27:40.656Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4419
Vulnerability from cvelistv5
Published
2013-11-05 20:00
Modified
2024-08-06 16:45
Severity ?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.194Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:1536",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
          },
          {
            "name": "55813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55813"
          },
          {
            "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
          },
          {
            "name": "SUSE-SU-2013:1626",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-07T20:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:1536",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
        },
        {
          "name": "55813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55813"
        },
        {
          "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
        },
        {
          "name": "SUSE-SU-2013:1626",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4419",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2013:1536",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
            },
            {
              "name": "55813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55813"
            },
            {
              "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
              "refsource": "MLIST",
              "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
            },
            {
              "name": "SUSE-SU-2013:1626",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4419",
    "datePublished": "2013-11-05T20:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.194Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}