Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-02445

Опубликовано: 13 июн. 2019
Источник: fstec
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость функции virDomainManagedSaveDefineXML библиотеки libvirtd связана с недостатками контроля доступа. Эксплуатация уязвимости может позволить нарушителю изменять произвольные файлы путем отправки специально сформированного запроса

Вендор

Red Hat Inc.
Сообщество свободного программного обеспечения
ООО «РусБИТех-Астра»

Наименование ПО

Red Hat Enterprise Linux
Debian GNU/Linux
Astra Linux Special Edition
libvirt

Версия ПО

Desktop 7 (Red Hat Enterprise Linux)
Workstation 7 (Red Hat Enterprise Linux)
Server 7 (Red Hat Enterprise Linux)
9 (Debian GNU/Linux)
1.6 «Смоленск» (Astra Linux Special Edition)
8.0 (Debian GNU/Linux)
Virtualization 4.3 (Red Hat Enterprise Linux)
Virtualization - EUS 4.2 for RHEL 7.6 (Red Hat Enterprise Linux)
Server - EUS7.6 (Red Hat Enterprise Linux)
Server - AUS 7.6 (Red Hat Enterprise Linux)
от 5.0.0 до 5.4.1 (libvirt)
10 (Debian GNU/Linux)
от 3.6.1 до 4.10.1 (libvirt)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux Workstation 7
Red Hat Inc. Red Hat Enterprise Linux Server 7
Red Hat Inc. Red Hat Enterprise Linux Desktop 7
Red Hat Inc. Red Hat Enterprise Linux Virtualization 4.3
Red Hat Inc. Red Hat Enterprise Linux Virtualization - EUS 4.2 for RHEL 7.6
Red Hat Inc. Red Hat Enterprise Linux Server - EUS 7.6
Red Hat Inc. Red Hat Enterprise Linux Server - AUS 7.6

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)

Возможные меры по устранению уязвимости

Для Libvirt:
использование рекомендаций производителя: https://access.redhat.com/libvirt-privesc-vulnerabilities
Для ОС Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2019-10166
Для ОС Astra Linux:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 5%
0.00025
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.

CVSS3: 7.8
redhat
около 6 лет назад

It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.

CVSS3: 7.8
nvd
почти 6 лет назад

It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.

CVSS3: 7.8
debian
почти 6 лет назад

It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x. ...

github
около 3 лет назад

It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.

EPSS

Процентиль: 5%
0.00025
Низкий

4.6 Medium

CVSS2