Описание
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-0189
- https://access.redhat.com/errata/RHBA-2014:1206
- https://access.redhat.com/errata/RHBA-2014:1513
- https://access.redhat.com/errata/RHSA-2015:0430
- https://access.redhat.com/security/cve/CVE-2014-0189
- https://bugzilla.redhat.com/show_bug.cgi?id=1081286
- https://bugzilla.redhat.com/show_bug.cgi?id=1088732
- http://rhn.redhat.com/errata/RHSA-2015-0430.html
- http://www.openwall.com/lists/oss-security/2014/04/28/2
- http://www.securityfocus.com/bid/67089
EPSS
Процентиль: 22%
0.00074
Низкий
CVE ID
Связанные уязвимости
redhat
почти 12 лет назад
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
nvd
почти 12 лет назад
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
fstec
больше 11 лет назад
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации
EPSS
Процентиль: 22%
0.00074
Низкий