Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1922

Опубликовано: 13 мая 2013
Источник: debian
EPSS Низкий

Описание

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xennot-affectedpackage
qemufixed1.5.0+dfsg-1package
qemuno-dsasqueezepackage
qemuno-dsawheezypackage
xen-qemu-dm-4.0not-affectedpackage

EPSS

Процентиль: 23%
0.00079
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

redhat
почти 13 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

nvd
больше 12 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

github
больше 3 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

EPSS

Процентиль: 23%
0.00079
Низкий