Описание
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
It was discovered that the /etc/sysconfig/virt-who configuration file, which may contain hypervisor authentication credentials, was world-readable. A local user could use this flaw to obtain authentication credentials from this file.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | virt-who | Affected | ||
| Red Hat Enterprise Linux 5 | virt-who | Fixed | RHBA-2014:1206 | 16.09.2014 |
| Red Hat Enterprise Linux 6 | virt-who | Fixed | RHBA-2014:1513 | 13.10.2014 |
| Red Hat Enterprise Linux 7 | virt-who | Fixed | RHSA-2015:0430 | 05.03.2015 |
Показывать по
Дополнительная информация
Статус:
2.1 Low
CVSS2
Связанные уязвимости
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации
2.1 Low
CVSS2