Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15708

Опубликовано: 06 нояб. 2020
Источник: debian

Описание

Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libvirtnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1866270#c2

  • Debian used to use polkit in 1.2.9-rc1-1 and only later on

  • enabled as well libvirtd socket activation. Ubuntu OTOH continued

  • to ship the Allow-libvirt-group-to-access-the-socket.patch patch

  • which caused the CVE-2020-15708 issue.

  • Upstream improved documentation in with:

  • https://www.redhat.com/archives/libvir-list/2020-August/msg00360.html

Связанные уязвимости

CVSS3: 9.3
ubuntu
больше 5 лет назад

Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

CVSS3: 7.8
redhat
больше 5 лет назад

Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

CVSS3: 9.3
nvd
больше 5 лет назад

Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

CVSS3: 7.8
github
больше 3 лет назад

Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

CVSS3: 7.8
fstec
больше 5 лет назад

Уязвимость библиотеки управления виртуализацией Libvirt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю повысить свои привилегии