Search criteria

15 vulnerabilities found for libguestfs by libguestfs

FKIE_CVE-2022-2211

Vulnerability from fkie_nvd - Published: 2022-07-12 21:15 - Updated: 2024-11-21 07:00
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "677F1ADC-0BEE-4E74-8C34-1036E53945A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
              "matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
              "matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una vulnerabilidad en libguestfs. Este problema es producido al calcular el mayor n\u00famero posible de claves coincidentes en la funci\u00f3n get_keys(). Este fallo conlleva a una denegaci\u00f3n de servicio, ya sea por error o por un actor malicioso"
    }
  ],
  "id": "CVE-2022-2211",
  "lastModified": "2024-11-21T07:00:32.703",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-12T21:15:09.800",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-2124

Vulnerability from fkie_nvd - Published: 2014-05-27 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "662D8743-9FBE-4048-8511-6C9AF4193706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEAA548-615C-4B5B-9E2C-7E65620EEFE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825024C-F3AD-4B76-8B43-B6F78DB0B3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A1FC10-0A20-4EA6-94D5-34629D059E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B688FBA6-1892-4EDC-A049-E90867EC4EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA9267E-D50E-4AE9-873C-C07797E4B8D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.20.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "02DF3922-A28E-4CFA-9907-2FAED0D72029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13F7320-1B55-4814-A098-940D21A462F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27A0A05-6482-4B3F-A4A4-B1E0F82885DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D91BEF4-301D-4A74-8C43-697B23B2E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A76C10D-BD16-443D-9A7D-8938AAC6552C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A12C8F3-C5B2-43ED-B729-FD51DE870952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A57EF2D-E4C8-46A7-8889-349091EDE1B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE39222C-BEAA-428D-A165-44DB34F79F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "09A64839-3B75-404C-A48F-3D5784627303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B126466-0774-43AD-9A16-74B3681AFEF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5315942-D14F-4D2A-BDA5-B4885C090784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7DCCBA-7340-49BC-8123-3539AA1B9BAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "672D8506-6DC4-4E40-8843-FCB22212EBC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "013A015E-AE93-44AE-991E-034DF06AE079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEA156D2-8AB4-477F-A75E-6BAB37361955",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9147F40-98D4-44B3-8FF5-DAB43BC23759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71EDD82-6320-4A68-9107-0436887BD86B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E37E1CF-3969-483C-B68F-8A42E65DB050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51693632-CFAB-466C-B0A0-49257871BA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA5DE95-07D8-4DB2-91CE-C7DE34E0D603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E39349B-5656-4989-96E2-EF0351C582E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B72D9E7-A1D4-4273-A7F1-FECB74D3AFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B23A55A-9E76-4ED6-8327-2F6362813C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C4AD1A3-962B-4575-A8A6-BAADB193D352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1F3731-012A-4323-9000-153105F4B5C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71207B8-E4BD-403D-8C0E-01E57179A3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F95FE6-A5A2-4F96-8AAE-A478E0C5E2B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C11574-11A3-408F-B84F-AC9D6C3A7D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AFC167-0E2E-4EA7-B7E6-DFBB947EEE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D1FD90-C5CD-454E-A233-D979E118F20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F723F4-5261-4BEE-BDD7-5E8B86E220EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFFBA88-0803-4FA1-B94E-98EA4542071E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "34208517-5E4C-42BA-9D85-76DC55FD10BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E9392B-178B-41DF-B7EA-146DF22301B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF4E45B3-14CF-44D4-B64B-4C07B726ADC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E354617-F38F-4982-B418-FB3F6DD7E215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC2A523-707B-4F0A-8ACD-2951C6C269BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "62216E2C-7A84-4F4D-92CC-EC32EECE7B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B523AB06-16E6-4F6C-B96A-F705550AACC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7198CD5-595C-4DB2-AC26-218DF2005CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.21.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8080CA6-AE70-43A7-8F76-0B316DD876A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D05D11AF-F047-4072-892F-A93C702A94EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.23.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E484129B-92AD-4A85-845F-4944BDBCF87A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de doble liberaci\u00f3n en inspect-fs.c en LibguestFS 1.20.x anterior a 1.20.7, 1.21.x, 1.22.0 y 1.23.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de archivos de invitados vac\u00edos."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/415.html\n\n\"CWE-415: Double Free\"",
  "id": "CVE-2013-2124",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-27T14:55:06.870",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/93724"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://seclists.org/oss-sec/2013/q2/431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/60205"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/93724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://seclists.org/oss-sec/2013/q2/431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/60205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4419

Vulnerability from fkie_nvd - Published: 2013-11-05 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDCD7E8-EB02-4686-8217-017306C55D52",
              "versionEndIncluding": "1.20.12",
              "versionStartIncluding": "1.20.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78562C81-E443-418F-BD73-29CA55F6F098",
              "versionEndIncluding": "1.22.7",
              "versionStartIncluding": "1.22.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "C3407560-6D54-4B1B-9977-AD4F6EB5D6BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "623DB4CD-8CB3-445A-B9B5-1238CF195235",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
    },
    {
      "lang": "es",
      "value": "El comando guestfish en libguestfs 1.20.12, 1.22.7 y anteriores versiones, cuando se usa la opci\u00f3n --remote o --listen, no comprueba adecuadamente la propiedad de /tmp/.guestfish-$UID/ al crear un archivo de socket temporal en este directorio, lo que permite a usuarios locales escribir en el socket y ejecutar comandos arbitrarios mediante la creaci\u00f3n de /tmp/.guestfish-$UID/ por adelantado."
    }
  ],
  "id": "CVE-2013-4419",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.2,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-05T20:55:29.397",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/55813"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/55813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-2690

Vulnerability from fkie_nvd - Published: 2012-06-29 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
Impacted products
Vendor Product Version
libguestfs libguestfs *
libguestfs libguestfs 1.16.0
libguestfs libguestfs 1.16.1
libguestfs libguestfs 1.16.2
libguestfs libguestfs 1.16.3
libguestfs libguestfs 1.16.4
libguestfs libguestfs 1.16.5
libguestfs libguestfs 1.16.6
libguestfs libguestfs 1.16.7
libguestfs libguestfs 1.16.8
libguestfs libguestfs 1.16.9
libguestfs libguestfs 1.16.10
libguestfs libguestfs 1.16.11
libguestfs libguestfs 1.16.12
libguestfs libguestfs 1.16.13
libguestfs libguestfs 1.16.14
libguestfs libguestfs 1.16.15
libguestfs libguestfs 1.16.16
libguestfs libguestfs 1.16.17
libguestfs libguestfs 1.16.18
libguestfs libguestfs 1.16.19
libguestfs libguestfs 1.16.20
libguestfs libguestfs 1.16.21
libguestfs libguestfs 1.16.22
libguestfs libguestfs 1.16.23
libguestfs libguestfs 1.16.24
libguestfs libguestfs 1.16.25
libguestfs libguestfs 1.16.26
libguestfs libguestfs 1.17.0
libguestfs libguestfs 1.17.1
libguestfs libguestfs 1.17.2
libguestfs libguestfs 1.17.3
libguestfs libguestfs 1.17.4
libguestfs libguestfs 1.17.5
libguestfs libguestfs 1.17.6
libguestfs libguestfs 1.17.7
libguestfs libguestfs 1.17.8
libguestfs libguestfs 1.17.9
libguestfs libguestfs 1.17.10
libguestfs libguestfs 1.17.11
libguestfs libguestfs 1.17.12
libguestfs libguestfs 1.17.13
libguestfs libguestfs 1.17.14
libguestfs libguestfs 1.17.15
libguestfs libguestfs 1.17.16
libguestfs libguestfs 1.17.17
libguestfs libguestfs 1.17.18
libguestfs libguestfs 1.17.19
libguestfs libguestfs 1.17.20
libguestfs libguestfs 1.17.21
libguestfs libguestfs 1.17.22
libguestfs libguestfs 1.17.23
libguestfs libguestfs 1.17.24
libguestfs libguestfs 1.17.25
libguestfs libguestfs 1.17.26
libguestfs libguestfs 1.17.27
libguestfs libguestfs 1.17.28
libguestfs libguestfs 1.17.29
libguestfs libguestfs 1.17.30
libguestfs libguestfs 1.17.31
libguestfs libguestfs 1.17.32
libguestfs libguestfs 1.17.33
libguestfs libguestfs 1.17.34
libguestfs libguestfs 1.17.35
libguestfs libguestfs 1.17.36
libguestfs libguestfs 1.17.37
libguestfs libguestfs 1.17.38
libguestfs libguestfs 1.17.39
libguestfs libguestfs 1.17.40
libguestfs libguestfs 1.17.41
libguestfs libguestfs 1.17.42

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77042966-6B71-4BB0-988A-4F3970F4AA4B",
              "versionEndIncluding": "1.17.43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04515F8E-5A27-4381-B7B7-AADAE47D671E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D278A56B-B56C-4165-949B-C25FF949ACBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E0BD26-E67F-47FF-B084-B8E9600E27E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A37E2A-DFF4-44B8-A237-D5BFA1E66CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4407B571-7927-4D6D-9854-4B689AE51E1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C528DB0A-7E43-4442-A0F0-020ED86B40AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A03D60-1AA5-4BE4-9A17-ECC5480F3B55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "690F95BA-DF60-451C-9444-BDB2AA1BCE3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E42608-CF94-42F5-81CC-869C49E16F25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4537FB10-6DA6-420F-A92F-64B87A9EFCF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC432530-78E4-4661-ACE1-4DDE24865BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64DEF3A-E7FF-497C-9ACC-888C92AA0F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04429F65-00DD-4A1C-8494-AEAE1E59C909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7FBC09-D65D-45F6-8415-782A44C3BEF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B5476BB-4A8A-4FF7-8E98-6A36A71EED9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "01C33E77-3452-45DF-94D7-F582FEF9FC27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "788A9046-8C39-4E73-BE43-37CD6DB5C00C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB97203-5931-4227-B2F0-4E8ADF9AB4F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A96D4FC-A451-4826-8687-85AD782B2CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "009E47DF-6663-471E-8F53-684EE73A37F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2FB7D6-0E16-4AEA-B01F-9FAF420E8BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEE5AD8-C3CD-42C8-8FE9-124BD31E9F06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2660643-C9BC-4C46-B9AB-ED026FDFDBD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9C99B3-5696-4370-80BA-5D3E4E997D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F55E2-06F7-400D-8E4A-267F2F9E3231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA0238BB-79F8-487A-8451-A4CF6E54CDE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.16.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D40F9C-1C7C-43AB-9512-844B65F9BE09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C25264-F591-487F-A6A0-6A10091EBBD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A11F90A-729A-4152-9829-F98E55056198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A649D17E-3F18-4457-9D37-DE5794F52D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BECC2472-1C8B-4910-987B-37E0E76F2A9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C46FEC-6B24-4848-B2F3-D190A2C27797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F923948-F8E4-4DFC-AD6A-E0334C36D5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5FF2B7A-7EF3-40B2-BAFE-73AED2F9B420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D98CCD0B-A7DF-4D96-BE0D-9C3A77784862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79A4E05-93BE-4D6A-AFBD-158509F05F18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9603FA-FBEB-4FAC-90D8-199AF6195BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD9D28E-E8A0-401F-9813-5FA4652322FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17AFE4E-83AA-47FB-B8DB-9BD3B8460EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8676D4D8-86A4-4BDF-9936-E6A3A75E95D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C776C88-7352-4EC3-8C98-D3CE62D73228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B756B1B-7357-4DEB-9B64-D54A79D9B041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1632AF2-7D5B-4972-8D6B-D71BE964CB12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC41158-D865-4EA8-8AEE-A58A386E3BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C64452-10CA-4B19-9B35-A65D0D12CD1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25674C8-966F-40DE-B874-B64E44670030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE20AFA-1206-4D74-B3FA-54AC85AB5F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6393B4A7-75B3-432F-907B-827E70AE6E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6B472A5-2939-48AB-B70A-049B77E1D9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF8FF77-8B2F-4C94-A410-AD9041555200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F422AD-045F-4551-8F1F-592AA0790063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "80225C95-1C57-47A7-86DD-AEF853F3C42F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92E60EA-F503-4A93-9DC3-FF7CD739C675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5880437-9C95-4551-8A41-B72C6ABAC4D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "39456795-F23E-4395-9672-ED543714BBD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "20BC7CC0-7A1B-47EE-8BC4-819E7D0ECEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC526CB-9355-4136-BF5E-7D4539B37A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "901ABE27-B8B5-4C7A-8840-DE7755470503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB081F2-D5FE-415B-8055-207716153EC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D4F1CF-AAA8-451A-A8D3-A9BC7DC4B76D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC716C8-7C76-4556-8424-30C7FD0E7600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A7F8070-3F20-4AA9-A127-11713F5285DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CF4E43-ACFD-4CC2-ACA9-BB60BF241794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "7167DDD4-E322-4C46-93E3-C3A9B6BEF96C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CA35DE-EC4D-4642-A7F1-049CF888D57D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73D4FDA-B905-43CF-9F7B-B80C09FEF79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "15153731-A1E9-4A6E-84B3-363AAD6B9DF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF89A01-FC64-4514-916E-0749EC68F6E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "937BBF4B-4809-4EE8-AE4F-D1FE12B532FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.17.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "67FF7B70-98D6-40CC-806D-0169CEBB9929",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information."
    },
    {
      "lang": "es",
      "value": "virt-edit de libguestfs anteriores a 1.18.0 no conserva los permisos del archivo original y guarda el nuevo fichero con permisos de lectura para otros al editar, lo que puede permitir a usuarios locales inviados obtener informaci\u00f3n confidencial."
    }
  ],
  "id": "CVE-2012-2690",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-29T19:55:04.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49431"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49545"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53932"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-3851

Vulnerability from fkie_nvd - Published: 2010-11-04 18:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.htmlPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html
secalert@redhat.comhttp://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/
secalert@redhat.comhttp://secunia.com/advisories/41797Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/42235
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-0586.html
secalert@redhat.comhttp://www.securityfocus.com/bid/44166
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2874Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2963
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=643958
secalert@redhat.comhttps://www.redhat.com/archives/libguestfs/2010-October/msg00036.html
secalert@redhat.comhttps://www.redhat.com/archives/libguestfs/2010-October/msg00037.html
secalert@redhat.comhttps://www.redhat.com/archives/libguestfs/2010-October/msg00041.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html
af854a3a-2127-422b-91ae-364da2661108http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41797Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42235
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0586.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/44166
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2874Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2963
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=643958
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/libguestfs/2010-October/msg00041.htmlPatch

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E2996B-8A3E-4AA0-A608-E139BBA5504E",
              "versionEndIncluding": "1.5.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DA99331-E185-467D-BDBC-5E18EBF56C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17AA91C9-BD8B-477C-9DE2-37F44CBA6450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E79577-A638-46DF-A47D-249E85E74C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "52231A57-0344-482A-BED8-5F4A9EBFA713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E48B2379-3CEA-4A58-AEA4-2328868F5339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E57163-94B3-4709-88A8-7139C531804F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "54368743-2B14-4B24-AC41-D4252D892468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "772290ED-6A09-477A-AFBA-14F901930015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "526A7F38-E24F-4550-912A-142B858848F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "55756BFD-70AC-4CB5-847C-13AE2F934332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ED35292-D610-4061-8E64-6EDCD6D92810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CE04FB-3F72-427F-A912-55C9DFA34558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0D7435-8AEA-4D14-AA28-1E93B2CCAFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EF36A0-E668-4565-92C5-1F7C48682CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "304BA946-0566-4E29-A6F6-A7BA0E17EE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "07866880-6171-4ADB-8438-21E7E77C5E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D74570-DF29-4F69-B94E-C51DE53E8C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "318EA742-A43B-4EA1-A3C8-3322498C1E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5D6136-D050-49C6-9C06-922C6A692A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541A9C5-EDBA-48D2-9B7E-351D0DEA06EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB4834F-02D2-4AA3-A4A8-DC0C6E7DEFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libguestfs:libguestfs:1.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "472FFF3B-FDC8-499D-98C0-5857BF8B404F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:matthew_booth:virt-v2v:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CDFDB5-535A-4ED4-BD04-A9D4A6D30584",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:richard_jones:virt-inspector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18AD5175-788D-407A-89D4-E98D82EFA293",
              "versionEndIncluding": "1.5.3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier."
    },
    {
      "lang": "es",
      "value": "libguestfs anterior a v1.5.23, que se utiliza en virt-V2V, virt-inspector v1.5.3 y anteriores, y posiblemente otros productos, cuando una imagen de disco sin formato se utiliza, permite a administradores locales del sistema operativo leer archivos desde el host mediante un (1) qcow2, (2) VMDK, o (3) VDI header manipulado, relacionados con la falta de apoyo de un especificador de formato de disco."
    }
  ],
  "id": "CVE-2010-3851",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-11-04T18:00:02.767",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41797"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/42235"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/44166"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2874"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/2963"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/44166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/2963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-2211 (GCVE-0-2022-2211)

Vulnerability from cvelistv5 – Published: 2022-07-12 20:33 – Updated: 2024-08-03 00:32
VLAI?
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
Severity ?
No CVSS data available.
CWE
  • Buffer Overflow
Assigner
References
Impacted products
Vendor Product Version
n/a libguestfs Affected: none
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:32:08.724Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libguestfs",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "none"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Buffer Overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-12T20:33:33",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-2211",
    "datePublished": "2022-07-12T20:33:33",
    "dateReserved": "2022-06-27T00:00:00",
    "dateUpdated": "2024-08-03T00:32:08.724Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2124 (GCVE-0-2013-2124)

Vulnerability from cvelistv5 – Published: 2014-05-27 15:00 – Updated: 2024-08-06 15:27
VLAI?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:27:40.656Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q2/431"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
          },
          {
            "name": "libguestfs-cve20132124-inspectfs-dos(85145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
          },
          {
            "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
          },
          {
            "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
          },
          {
            "name": "93724",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/93724"
          },
          {
            "name": "60205",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/60205"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q2/431"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
        },
        {
          "name": "libguestfs-cve20132124-inspectfs-dos(85145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
        },
        {
          "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
        },
        {
          "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
        },
        {
          "name": "93724",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/93724"
        },
        {
          "name": "60205",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/60205"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2124",
    "datePublished": "2014-05-27T15:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:27:40.656Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4419 (GCVE-0-2013-4419)

Vulnerability from cvelistv5 – Published: 2013-11-05 20:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://rhn.redhat.com/errata/RHSA-2013-1536.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/55813 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/libguestfs/2013-O… mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=1016960 x_refsource_MISC
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.194Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:1536",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
          },
          {
            "name": "55813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55813"
          },
          {
            "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
          },
          {
            "name": "SUSE-SU-2013:1626",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-07T20:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:1536",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
        },
        {
          "name": "55813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55813"
        },
        {
          "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
        },
        {
          "name": "SUSE-SU-2013:1626",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4419",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2013:1536",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
            },
            {
              "name": "55813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55813"
            },
            {
              "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
              "refsource": "MLIST",
              "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
            },
            {
              "name": "SUSE-SU-2013:1626",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4419",
    "datePublished": "2013-11-05T20:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.194Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2690 (GCVE-0-2012-2690)

Vulnerability from cvelistv5 – Published: 2012-06-29 19:00 – Updated: 2024-08-06 19:42
VLAI?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/49545 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/libguestfs/2012-M… mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/53932 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://rhn.redhat.com/errata/RHSA-2012-0774.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/49431 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49545"
          },
          {
            "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
          },
          {
            "name": "53932",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53932"
          },
          {
            "name": "libguestfs-virtedit-info-disc(76220)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
          },
          {
            "name": "RHSA-2012:0774",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
          },
          {
            "name": "49431",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49431"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "49545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49545"
        },
        {
          "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
        },
        {
          "name": "53932",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53932"
        },
        {
          "name": "libguestfs-virtedit-info-disc(76220)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
        },
        {
          "name": "RHSA-2012:0774",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
        },
        {
          "name": "49431",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49431"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2690",
    "datePublished": "2012-06-29T19:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3851 (GCVE-0-2010-3851)

Vulnerability from cvelistv5 – Published: 2010-11-04 17:00 – Updated: 2024-08-07 03:26
VLAI?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
          },
          {
            "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
          },
          {
            "name": "FEDORA-2010-16835",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
          },
          {
            "name": "FEDORA-2010-17202",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
          },
          {
            "name": "ADV-2010-2963",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2963"
          },
          {
            "name": "RHSA-2011:0586",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
          },
          {
            "name": "44166",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/44166"
          },
          {
            "name": "41797",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41797"
          },
          {
            "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
          },
          {
            "name": "42235",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42235"
          },
          {
            "name": "ADV-2010-2874",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2874"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-25T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
        },
        {
          "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
        },
        {
          "name": "FEDORA-2010-16835",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
        },
        {
          "name": "FEDORA-2010-17202",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
        },
        {
          "name": "ADV-2010-2963",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2963"
        },
        {
          "name": "RHSA-2011:0586",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
        },
        {
          "name": "44166",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/44166"
        },
        {
          "name": "41797",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41797"
        },
        {
          "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
        },
        {
          "name": "42235",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42235"
        },
        {
          "name": "ADV-2010-2874",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2874"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-3851",
    "datePublished": "2010-11-04T17:00:00",
    "dateReserved": "2010-10-08T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-2211 (GCVE-0-2022-2211)

Vulnerability from nvd – Published: 2022-07-12 20:33 – Updated: 2024-08-03 00:32
VLAI?
Summary
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
Severity ?
No CVSS data available.
CWE
  • Buffer Overflow
Assigner
References
Impacted products
Vendor Product Version
n/a libguestfs Affected: none
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:32:08.724Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libguestfs",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "none"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Buffer Overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-12T20:33:33",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2022-2211"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-2211",
    "datePublished": "2022-07-12T20:33:33",
    "dateReserved": "2022-06-27T00:00:00",
    "dateUpdated": "2024-08-03T00:32:08.724Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2124 (GCVE-0-2013-2124)

Vulnerability from nvd – Published: 2014-05-27 15:00 – Updated: 2024-08-06 15:27
VLAI?
Summary
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:27:40.656Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q2/431"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
          },
          {
            "name": "libguestfs-cve20132124-inspectfs-dos(85145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
          },
          {
            "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
          },
          {
            "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
          },
          {
            "name": "93724",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/93724"
          },
          {
            "name": "60205",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/60205"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130529 Re: Re: CVE Request -- libguestfs (1.20.6 | 1.22.0 | 1.23.0 \u003c= X \u003c 1.22.1 | 1.23.1): Denial of service due to a double-free when inspecting certain guest files / images",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q2/431"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd"
        },
        {
          "name": "libguestfs-cve20132124-inspectfs-dos(85145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85145"
        },
        {
          "name": "[Libguestfs] 20130528 ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html"
        },
        {
          "name": "[Libguestfs] 20130528 Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html"
        },
        {
          "name": "93724",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/93724"
        },
        {
          "name": "60205",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/60205"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2124",
    "datePublished": "2014-05-27T15:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:27:40.656Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4419 (GCVE-0-2013-4419)

Vulnerability from nvd – Published: 2013-11-05 20:00 – Updated: 2024-08-06 16:45
VLAI?
Summary
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://rhn.redhat.com/errata/RHSA-2013-1536.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/55813 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/libguestfs/2013-O… mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=1016960 x_refsource_MISC
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.194Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:1536",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
          },
          {
            "name": "55813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55813"
          },
          {
            "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
          },
          {
            "name": "SUSE-SU-2013:1626",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-07T20:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:1536",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
        },
        {
          "name": "55813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55813"
        },
        {
          "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
        },
        {
          "name": "SUSE-SU-2013:1626",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4419",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2013:1536",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1536.html"
            },
            {
              "name": "55813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55813"
            },
            {
              "name": "[Libguestfs] 20131017 ANNOUNCE: CVE-2013-4419: insecure temporary directory handling for guestfish\u0027s network socket",
              "refsource": "MLIST",
              "url": "https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1016960"
            },
            {
              "name": "SUSE-SU-2013:1626",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4419",
    "datePublished": "2013-11-05T20:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.194Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2690 (GCVE-0-2012-2690)

Vulnerability from nvd – Published: 2012-06-29 19:00 – Updated: 2024-08-06 19:42
VLAI?
Summary
virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/49545 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/libguestfs/2012-M… mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/53932 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://rhn.redhat.com/errata/RHSA-2012-0774.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/49431 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:32.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49545"
          },
          {
            "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
          },
          {
            "name": "53932",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53932"
          },
          {
            "name": "libguestfs-virtedit-info-disc(76220)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
          },
          {
            "name": "RHSA-2012:0774",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
          },
          {
            "name": "49431",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49431"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "49545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49545"
        },
        {
          "name": "[Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html"
        },
        {
          "name": "53932",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53932"
        },
        {
          "name": "libguestfs-virtedit-info-disc(76220)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220"
        },
        {
          "name": "RHSA-2012:0774",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html"
        },
        {
          "name": "49431",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49431"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2690",
    "datePublished": "2012-06-29T19:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:32.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3851 (GCVE-0-2010-3851)

Vulnerability from nvd – Published: 2010-11-04 17:00 – Updated: 2024-08-07 03:26
VLAI?
Summary
libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:26:11.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
          },
          {
            "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
          },
          {
            "name": "FEDORA-2010-16835",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
          },
          {
            "name": "FEDORA-2010-17202",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
          },
          {
            "name": "ADV-2010-2963",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2963"
          },
          {
            "name": "RHSA-2011:0586",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
          },
          {
            "name": "44166",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/44166"
          },
          {
            "name": "41797",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41797"
          },
          {
            "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
          },
          {
            "name": "42235",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42235"
          },
          {
            "name": "ADV-2010-2874",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2874"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-25T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[Libguestfs] 20101022 [PATCH 0/8 v2] Complete fix for CVE-2010-3851.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00041.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643958"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions/"
        },
        {
          "name": "[Libguestfs] 20101021 [PATCH 0/2] First part of fix for CVE-2010-3851",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00037.html"
        },
        {
          "name": "FEDORA-2010-16835",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html"
        },
        {
          "name": "FEDORA-2010-17202",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html"
        },
        {
          "name": "ADV-2010-2963",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2963"
        },
        {
          "name": "RHSA-2011:0586",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0586.html"
        },
        {
          "name": "44166",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/44166"
        },
        {
          "name": "41797",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41797"
        },
        {
          "name": "[Libguestfs] 20101019 CVE-2010-3851libguestfs:missing disk format specifier when adding a disk",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://www.redhat.com/archives/libguestfs/2010-October/msg00036.html"
        },
        {
          "name": "42235",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42235"
        },
        {
          "name": "ADV-2010-2874",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2874"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-3851",
    "datePublished": "2010-11-04T17:00:00",
    "dateReserved": "2010-10-08T00:00:00",
    "dateUpdated": "2024-08-07T03:26:11.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}