CVE-2013-2007
qemu: guest agent creates files with insecure permissions in deamon mode
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
El agente qemu en en Qemu 1.4.1 y anteriores, usado por Xen, cuando se inicia en modo demonio, utiliza permisos débiles para determinados archivos, lo que permite a usuarios locales leer y escribir sobre estos archivos.
KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the user-space component for running virtual machines using KVM. It was found that QEMU Guest Agent created certain files with world-writable permissions when run in daemon mode. An unprivileged guest user could use this flaw to consume all free space on the partition containing the qemu-ga log file, or modify the contents of the log. When a UNIX domain socket transport was explicitly configured to be used, an unprivileged guest user could potentially use this flaw to escalate their privileges in the guest. This update requires manual action.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-05-21 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c689b4f1bac352dcfd6ecb9a1d45337de0f1de67 | X_refsource_confirm | |
http://osvdb.org/93032 | Vdb Entry | |
http://www.openwall.com/lists/oss-security/2013/05/06/5 | Mailing List |
|
http://www.securityfocus.com/bid/59675 | Vdb Entry | |
http://www.securitytracker.com/id/1028521 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/84047 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-07/msg00057.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2013-0791.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2013-0896.html | 2023-02-13 | |
http://secunia.com/advisories/53325 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=956082 | 2013-06-03 | |
https://access.redhat.com/security/cve/CVE-2013-2007 | 2013-06-03 |