// For flags

CVE-2013-2231

qemu: qemu-ga win32 service unquoted search path

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.

Vulnerabilidad de búsqueda de ruta Windows sin entrecomillar en el servicio QEMU GuestAgent para Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, y Workstation Supplementary 6, al instalar Windows, permite a usuarios locales obtener privliegios a través de un programa manipulado en un directorio no especificado.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-19 CVE Reserved
  • 2013-07-22 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
  • CWE-428: Unquoted Search Path or Element
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
6.0
Search vendor "Redhat" for product "Enterprise Linux" and version "6.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop Supplementary
Search vendor "Redhat" for product "Enterprise Linux Desktop Supplementary"
6.0
Search vendor "Redhat" for product "Enterprise Linux Desktop Supplementary" and version "6.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Redhat
Search vendor "Redhat"
Enterprise Linux Server Supplementary
Search vendor "Redhat" for product "Enterprise Linux Server Supplementary"
6.0
Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" and version "6.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Redhat
Search vendor "Redhat"
Enterprise Linux Server Supplementary
Search vendor "Redhat" for product "Enterprise Linux Server Supplementary"
6.4
Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" and version "6.4"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Redhat
Search vendor "Redhat"
Enterprise Linux Server Supplementary
Search vendor "Redhat" for product "Enterprise Linux Server Supplementary"
6.4.z
Search vendor "Redhat" for product "Enterprise Linux Server Supplementary" and version "6.4.z"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation Supplementary
Search vendor "Redhat" for product "Enterprise Linux Workstation Supplementary"
6.0
Search vendor "Redhat" for product "Enterprise Linux Workstation Supplementary" and version "6.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe