Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-0998

Опубликовано: 14 мар. 2007
Источник: redhat

Описание

The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=230295HVM guest VNC server allows compromise of entire host OS by any VNC console user

Связанные уязвимости

ubuntu
около 18 лет назад

The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.

nvd
около 18 лет назад

The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.

debian
около 18 лет назад

The VNC server implementation in QEMU, as used by Xen and possibly oth ...

github
около 3 лет назад

The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.

oracle-oval
почти 18 лет назад

ELSA-2007-0114: Important: xen security update (IMPORTANT)