cve-2013-6456
Vulnerability from cvelistv5
Published
2014-04-15 18:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://libvirt.org/news.html" }, { "name": "56187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56187" }, { "name": "60895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60895" }, { "name": "GLSA-201412-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4" }, { "name": "openSUSE-SU-2014:0593", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security.libvirt.org/2013/0018.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045643" }, { "name": "FEDORA-2014-2864", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html" }, { "name": "65743", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65743" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394" }, { "name": "56215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56215" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to \"paths under /proc/$PID/root\" and the virInitctlSetRunLevel function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-12T13:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://libvirt.org/news.html" }, { "name": "56187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56187" }, { "name": "60895", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60895" }, { "name": "GLSA-201412-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4" }, { "name": "openSUSE-SU-2014:0593", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security.libvirt.org/2013/0018.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045643" }, { "name": "FEDORA-2014-2864", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html" }, { "name": "65743", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65743" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394" }, { "name": "56215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56215" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6456", "datePublished": "2014-04-15T18:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DDA1805-ED8A-44AA-96FF-E676D278CCFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBD82EEA-279F-42CA-8F4C-A4D57EEBAB0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"320C2182-DBCF-4564-940A-D12673C73543\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB635DBE-29F1-4055-A064-42539FC811C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67B77F63-C9AC-42D4-B9E2-4BBE196AC254\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3256288E-5A49-4DCD-AE30-6B4E21AEF970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25E764AE-3B7C-4378-97C5-10E835511684\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49FEFFA5-371E-4B1D-AAAE-C71AEB79A4AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F982F65C-CBF9-4EE6-8FD6-C965141E42C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4BF8152-79A4-48C6-88EB-9D3FA7466844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9E4DCDE-4D85-4339-99CB-70A464FA2EE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E03AF346-6F4E-4BEA-B29E-9C9C04148843\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54FAE380-0E7E-4468-A07B-5A9A3504F681\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB4B1021-4D01-4D86-AED4-0418F8839FD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"380686BB-7212-4285-BA00-B8EEAC6E1CC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A331072-326A-4E72-84E2-E0424E6DDE30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB1666DD-AC49-477A-921C-8197F5EFECA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"527B9236-CA4E-42A8-8C7A-2FB92BE2B4B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA9572AC-1D6D-4AA1-AEF0-CB9143F38215\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to \\\"paths under /proc/$PID/root\\\" and the virInitctlSetRunLevel function.\"}, {\"lang\": \"es\", \"value\": \"El controlador LXC (lxc/lxc_driver.c) en libvirt 1.0.1 hasta 1.2.1 permite a usuarios locales (1) borrar dispositivos arbitrarios a trav\\u00e9s de API virDomainDeviceDettach y un ataque symlink en /dev en el contenedor; (2) crear nodos arbitrarios (mknod) a trav\\u00e9s de la API virDomainDeviceAttach y un ataque symlink en /dev en el contenedor; y causar una denegaci\\u00f3n de servicio (apagado o reinicio del sistema operativo del host) a trav\\u00e9s de (3) virDomainShutdown o (4) virDomainReboot API y a un ataque symlink en /dev/initctl en el contenedor, relacionado con \\\"rutas contenidas en /proc/$PID/root\\\" y la funci\\u00f3n virInitctlSetRunLevel.\\n\"}]", "id": "CVE-2013-6456", "lastModified": "2024-11-21T01:59:16.070", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:M/Au:S/C:N/I:P/A:C\", \"baseScore\": 5.8, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.4, \"impactScore\": 7.8, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-04-15T23:55:08.547", "references": "[{\"url\": \"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://libvirt.org/news.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/56187\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/56215\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/60895\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201412-04.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.libvirt.org/2013/0018.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/65743\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1045643\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://libvirt.org/news.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/56187\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/56215\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/60895\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201412-04.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.libvirt.org/2013/0018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/65743\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1045643\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-59\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-6456\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-04-15T23:55:08.547\",\"lastModified\":\"2024-11-21T01:59:16.070\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to \\\"paths under /proc/$PID/root\\\" and the virInitctlSetRunLevel function.\"},{\"lang\":\"es\",\"value\":\"El controlador LXC (lxc/lxc_driver.c) en libvirt 1.0.1 hasta 1.2.1 permite a usuarios locales (1) borrar dispositivos arbitrarios a trav\u00e9s de API virDomainDeviceDettach y un ataque symlink en /dev en el contenedor; (2) crear nodos arbitrarios (mknod) a trav\u00e9s de la API virDomainDeviceAttach y un ataque symlink en /dev en el contenedor; y causar una denegaci\u00f3n de servicio (apagado o reinicio del sistema operativo del host) a trav\u00e9s de (3) virDomainShutdown o (4) virDomainReboot API y a un ataque symlink en /dev/initctl en el contenedor, relacionado con \\\"rutas contenidas en /proc/$PID/root\\\" y la funci\u00f3n virInitctlSetRunLevel.\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:S/C:N/I:P/A:C\",\"baseScore\":5.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.4,\"impactScore\":7.8,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDA1805-ED8A-44AA-96FF-E676D278CCFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD82EEA-279F-42CA-8F4C-A4D57EEBAB0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320C2182-DBCF-4564-940A-D12673C73543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB635DBE-29F1-4055-A064-42539FC811C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B77F63-C9AC-42D4-B9E2-4BBE196AC254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3256288E-5A49-4DCD-AE30-6B4E21AEF970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E764AE-3B7C-4378-97C5-10E835511684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FEFFA5-371E-4B1D-AAAE-C71AEB79A4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F982F65C-CBF9-4EE6-8FD6-C965141E42C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4BF8152-79A4-48C6-88EB-9D3FA7466844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E4DCDE-4D85-4339-99CB-70A464FA2EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03AF346-6F4E-4BEA-B29E-9C9C04148843\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FAE380-0E7E-4468-A07B-5A9A3504F681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4B1021-4D01-4D86-AED4-0418F8839FD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"380686BB-7212-4285-BA00-B8EEAC6E1CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A331072-326A-4E72-84E2-E0424E6DDE30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1666DD-AC49-477A-921C-8197F5EFECA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"527B9236-CA4E-42A8-8C7A-2FB92BE2B4B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9572AC-1D6D-4AA1-AEF0-CB9143F38215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"}]}]}],\"references\":[{\"url\":\"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://libvirt.org/news.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/56187\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/56215\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/60895\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-04.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.libvirt.org/2013/0018.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/65743\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1045643\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5fc590ad9f4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://libvirt.org/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/56187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/56215\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/60895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-04.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.libvirt.org/2013/0018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/65743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1045643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.