fkie_cve-2010-2239
Vulnerability from fkie_nvd
Published
2010-08-19 18:00
Modified
2024-11-21 01:16
Severity ?
Summary
Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libvirt | libvirt | 0.6.0 | |
libvirt | libvirt | 0.6.1 | |
libvirt | libvirt | 0.6.2 | |
libvirt | libvirt | 0.6.3 | |
libvirt | libvirt | 0.6.4 | |
libvirt | libvirt | 0.6.5 | |
libvirt | libvirt | 0.7.0 | |
libvirt | libvirt | 0.7.1 | |
libvirt | libvirt | 0.7.2 | |
libvirt | libvirt | 0.7.3 | |
libvirt | libvirt | 0.7.4 | |
libvirt | libvirt | 0.7.5 | |
libvirt | libvirt | 0.7.6 | |
libvirt | libvirt | 0.7.7 | |
libvirt | libvirt | 0.8.0 | |
libvirt | libvirt | 0.8.1 | |
libvirt | libvirt | 0.8.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "49C0A68D-E8D2-47CD-BEB0-24556A20C78F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "9543A7ED-BCFE-4153-96CB-AA2625C12394", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "45408F0A-6A45-4E2E-A790-3FE00EDFF470", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D222C1F-65A4-4D04-8266-A77E7D06A0B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "16C34138-85A3-4FF9-8978-F4F80E8476B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE578174-7026-4D7A-8CC9-24A29136C32E", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "35E44DBE-E780-4AC4-82E5-AB1A94EACBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B6AC4559-DFF0-45BA-8035-9BDF3BE44C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F2E72-C436-46A4-A4B9-9F2B567FE8A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D1EBC94-5CB9-4B5A-9CB3-C10DE191AE3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "05461C68-1BA6-4BA5-97F1-D56E0A62A37F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "D6507C31-9F5F-488D-9D0D-C233CA1DED01", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "3199D614-94CD-4E12-9127-4459BB6A84FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "EC2EE32A-68DF-4343-A5B1-6861324E592B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "330BFC7B-1971-42C3-BBB5-1498B112E8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "39D87F93-98FE-414B-8D32-C9AB853A235D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "B38AB6E8-DE2F-426C-A8E9-2572611AE5E1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors." }, { "lang": "es", "value": "Red Hat libvirt, posiblemente v0.6.0 hasta v0.8.2, crea nuevas imagenes sin configurar el formato definido por el usuario backing-store, lo que permite a usuarios invitados al SO leer ficheros de su elecci\u00f3n en el SO anfitri\u00f3n a trav\u00e9s de vectores sin especificar." } ], "id": "CVE-2010-2239", "lastModified": "2024-11-21T01:16:13.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 2.7, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-19T18:00:03.577", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://libvirt.org/news.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1008-1" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1008-2" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-1008-3" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0615.html" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2010/2062" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2010/2763" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://libvirt.org/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1008-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1008-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-1008-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0615.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607812" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.