CVE-2011-1146
libvirt: several API calls do not honour read-only connection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
libvirt.c en la API de Red Hat libvirt v0.8.8 no restringe correctamente las operaciones en una conexión de solo lectura, lo que podría permitir a atacantes remotos provocar una denegación de servicio (caida del sistema operativo) o posiblemente ejecutar código de su elección a través de una llamada (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, o (6) virConnectDomainXMLToNative, una vulnerabilidad diferente de CVE-2008-5086.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-03-03 CVE Reserved
- 2011-03-15 CVE Published
- 2024-02-11 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (24)
URL | Tag | Source |
---|---|---|
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=71753cb7f7a16ff800381c0b5ee4e99eea92fed3 | X_refsource_confirm | |
http://secunia.com/advisories/43780 | Third Party Advisory | |
http://secunia.com/advisories/43897 | Third Party Advisory | |
http://secunia.com/advisories/43917 | Third Party Advisory | |
http://secunia.com/advisories/44069 | Third Party Advisory | |
http://www.securityfocus.com/bid/46820 | Vdb Entry | |
http://www.securitytracker.com/id?1025262 | Vdb Entry | |
http://www.vupen.com/english/advisories/2011/0694 | Vdb Entry | |
http://www.vupen.com/english/advisories/2011/0700 | Vdb Entry | |
http://www.vupen.com/english/advisories/2011/0794 | Vdb Entry | |
http://www.vupen.com/english/advisories/2011/0805 | Vdb Entry | |
https://bugzilla.novell.com/show_bug.cgi?id=678406 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66012 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773 | 2023-02-13 | |
http://openwall.com/lists/oss-security/2011/03/09/3 | 2023-02-13 | |
http://openwall.com/lists/oss-security/2011/03/10/5 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=683650 | 2011-03-28 |
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056209.html | 2023-02-13 | |
http://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html | 2023-02-13 | |
http://secunia.com/advisories/43670 | 2023-02-13 | |
http://www.debian.org/security/2011/dsa-2194 | 2023-02-13 | |
http://www.redhat.com/support/errata/RHSA-2011-0391.html | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1094-1 | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2011-1146 | 2011-03-28 |