fkie_cve-2008-5086
Vulnerability from fkie_nvd
Published
2008-12-19 17:30
Modified
2024-11-21 00:53
Severity ?
Summary
Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3E86FE3D-BC93-49DE-8D34-61C17072D190", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DB95BD9D-A6B5-47B9-B2B0-9C4CC67BA62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DA90AC2-B415-42F5-86E5-9564F4133A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "29FBE340-26FF-4D72-99C3-423786A2095B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "01BFB306-AF97-460F-9D26-9CF53018280D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5D9844D-5B89-4B47-9E38-BDF0C44D1BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E4BA9E6F-7F06-4341-928A-5CE6C5EAAA7A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions." }, { "lang": "es", "value": "M\u00faltiples m\u00e9todos en libvirt 0.3.2 a 0.5.1 no comprueban si una conexi\u00f3n es de s\u00f3lo lectura, lo que permite a usuarios locales eludir restricciones de acceso y realizar acciones administrativas." } ], "id": "CVE-2008-5086", "lastModified": "2024-11-21T00:53:15.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-19T17:30:03.000", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/50919" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/33198" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33217" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/33292" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/34397" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00938.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2009-0382.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32905" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-694-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=476560" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8765" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/libvir-list/2008-December/msg00522.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00938.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-0382.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-694-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=476560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/libvir-list/2008-December/msg00522.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.