// For flags

CVE-2013-2144

rhevm: insufficient target domain permission check when cloning a VM from a snapshot

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Red Hat Enterprise Virtualization Manager (RHEVM) before 3.2 does not properly check permissions for the target storage domain, which allows attackers to cause a denial of service (disk space consumption) by cloning a VM from a snapshot.

Red Hat Enterprise Virtualization Manager (RHEVM) anterior a 3.2, no maneja adecuadamente los permisos para el dominio de almacenamiento objetivo, lo que permite a atacantes provocar una denegación de servicio (consumo de espacio de disco) mediante el clonado de una máquina virtual desde un SnapShot.

Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual servers running Red Hat Enterprise Linux and Microsoft Windows. This package also includes the Red Hat Enterprise Virtualization Manager API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. It was found that permission checks were not performed on the target storage domain when cloning a virtual machine from a snapshot. An attacker could use this flaw to perform a denial of service attack, exhausting free disk space on the target storage domain.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-19 CVE Reserved
  • 2013-06-11 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Enterprise Virtualization Manager
Search vendor "Redhat" for product "Enterprise Virtualization Manager"
<= 3.1
Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version " <= 3.1"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Virtualization Manager
Search vendor "Redhat" for product "Enterprise Virtualization Manager"
2.1
Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "2.1"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Virtualization Manager
Search vendor "Redhat" for product "Enterprise Virtualization Manager"
2.2
Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "2.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Virtualization Manager
Search vendor "Redhat" for product "Enterprise Virtualization Manager"
2.2.3
Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "2.2.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Virtualization Manager
Search vendor "Redhat" for product "Enterprise Virtualization Manager"
3.0
Search vendor "Redhat" for product "Enterprise Virtualization Manager" and version "3.0"
-
Affected