Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-1922

Опубликовано: 13 мая 2013
Источник: nvd
CVSS2: 3.3
EPSS Низкий

Описание

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 23%
0.00079
Низкий

3.3 Low

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
больше 12 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

redhat
почти 13 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

debian
больше 12 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw ...

github
больше 3 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

EPSS

Процентиль: 23%
0.00079
Низкий

3.3 Low

CVSS2

Дефекты

CWE-264