2 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 71EXPL: 0

virt-edit in libguestfs before 1.18.0 does not preserve the permissions from the original file and saves the new file with world-readable permissions when editing, which might allow local guest users to obtain sensitive information. virt-edit de libguestfs anteriores a 1.18.0 no conserva los permisos del archivo original y guarda el nuevo fichero con permisos de lectura para otros al editar, lo que puede permitir a usuarios locales inviados obtener información confidencial. • http://rhn.redhat.com/errata/RHSA-2012-0774.html http://secunia.com/advisories/49431 http://secunia.com/advisories/49545 http://www.securityfocus.com/bid/53932 https://exchange.xforce.ibmcloud.com/vulnerabilities/76220 https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html https://access.redhat.com/security/cve/CVE-2012-2690 https://bugzilla.redhat.com/show_bug.cgi?id=831117 • CWE-255: Credentials Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 25EXPL: 0

libguestfs before 1.5.23, as used in virt-v2v, virt-inspector 1.5.3 and earlier, and possibly other products, when a raw-format disk image is used, allows local guest OS administrators to read files from the host via a crafted (1) qcow2, (2) VMDK, or (3) VDI header, related to lack of support for a disk format specifier. libguestfs anterior a v1.5.23, que se utiliza en virt-V2V, virt-inspector v1.5.3 y anteriores, y posiblemente otros productos, cuando una imagen de disco sin formato se utiliza, permite a administradores locales del sistema operativo leer archivos desde el host mediante un (1) qcow2, (2) VMDK, o (3) VDI header manipulado, relacionados con la falta de apoyo de un especificador de formato de disco. • http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050237.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050742.html http://rwmj.wordpress.com/2010/10/23/new-libguestfs-stable-versions http://secunia.com/advisories/41797 http://secunia.com/advisories/42235 http://www.redhat.com/support/errata/RHSA-2011-0586.html http://www.securityfocus.com/bid/44166 http://www.vupen.com/english/advisories/2010/2874 http://www.vupen.com/english/advisories&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •