Page 5 of 49 results (0.009 seconds)

CVSS: 9.8EPSS: 2%CPEs: 58EXPL: 0

10 Aug 2011 — Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption. Desbordamiento de entero en libvirt anterior a v0.9.3 permite a usuarios autenticados remotamente provocar una denegación de servicio (caída libvirtd) y posiblemente ejecutar código arbitrario a través de una llamada manipulada VirDomainGetVcpus RPC que provoca corrupción de memor... • http://libvirt.org/news.html • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 0%CPEs: 55EXPL: 0

31 May 2011 — libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which allows remote attackers to cause a denial of service (crash) by causing multiple threads to report errors at the same time. libvirtd de libvirt en versiones anteriores a la 0.9.0 no utiliza el reporte de errores "thread-safe", lo que permite a atacantes remotos provocar una denegación de servicio (caída) provocando que múltiples hilos reporten errores al mismo tiempo. • http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f44bfb7fb978c9313ce050a1c4149bf04aa0a670 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

15 Mar 2011 — libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086. libvirt.c en la API de Red Hat libvirt v0.8.8 no restringe co... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 16EXPL: 0

19 Aug 2010 — Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. Red Hat libvirt, posiblemente v0.6.1 hasta v0.8.2, busca almacenes de respaldo de discos sin hacer referencia al formato del disco definido por el usuario principal, lo que podría permitir a usuarios invitados al SO leer ficheros de su elecci... • http://libvirt.org/news.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 9EXPL: 0

19 Aug 2010 — Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. Red Hat libvirt, posiblemente v0.7.2 hasta v0.8.2, se repite en almacenes de respaldo de imagen de disco sin extraer el formato de disco de respaldo definido, lo cual puede permitir a usuarios invitados del Sistema Operativo leer... • http://libvirt.org/news.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 17EXPL: 0

19 Aug 2010 — Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors. Red Hat libvirt, posiblemente v0.6.0 hasta v0.8.2, crea nuevas imagenes sin configurar el formato definido por el usuario backing-store, lo que permite a usuarios invitados al SO leer ficheros de su elección en el SO anfitrión a través de vectores sin especificar. • http://libvirt.org/news.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 33EXPL: 0

19 Aug 2010 — Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree. Red Hat libvirt v0.2.0 hasta v0.8.2 crea reglas de iptable con asignaciones inadecuadas de puertos de origen privilegiados, lo que permite a usuarios invitados del SO evitar las restricciones de acceso establecidas aprovech... • http://libvirt.org/news.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 4

11 Feb 2009 — Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check. Desbordamiento de búfer en la función proxyReadClientSocket en proxy/libvirt_proxy.c en libvirt_proxy v0.5.1, podría permitir a usuarios locales elevar sus privil... • https://www.exploit-db.com/exploits/8534 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

19 Dec 2008 — Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions. Múltiples métodos en libvirt 0.3.2 a 0.5.1 no comprueban si una conexión es de sólo lectura, lo que permite a usuarios locales eludir restricciones de acceso y realizar acciones administrativas. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html •