Show filters
85 Total Results
Displaying 21-30 of 85
Sort by:
Attacker Value
Unknown
CVE-2019-10166
Disclosure Date: August 02, 2019 (last updated November 27, 2024)
It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
0
Attacker Value
Unknown
CVE-2019-10167
Disclosure Date: August 02, 2019 (last updated November 27, 2024)
The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
0
Attacker Value
Unknown
CVE-2019-10168
Disclosure Date: August 02, 2019 (last updated November 27, 2024)
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
0
Attacker Value
Unknown
CVE-2019-10161
Disclosure Date: July 30, 2019 (last updated November 08, 2023)
It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
0
Attacker Value
Unknown
CVE-2019-10132
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
0
Attacker Value
Unknown
CVE-2016-10746
Disclosure Date: April 18, 2019 (last updated November 27, 2024)
libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
0
Attacker Value
Unknown
CVE-2019-3886
Disclosure Date: April 04, 2019 (last updated November 27, 2024)
An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
0
Attacker Value
Unknown
CVE-2019-3840
Disclosure Date: March 27, 2019 (last updated November 08, 2023)
A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.
0
Attacker Value
Unknown
CVE-2017-2635
Disclosure Date: August 22, 2018 (last updated November 08, 2023)
A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
0
Attacker Value
Unknown
CVE-2015-5160
Disclosure Date: August 20, 2018 (last updated November 27, 2024)
libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
0