Vulnerability Name:

CVE-2008-2004 (CCN-42268)

Assigned:2008-04-27
Published:2008-04-27
Updated:2017-09-29
Summary:The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2008-2004

Source: CCN
Type: QEMU Web site
QEMU

Source: CCN
Type: Qemu-devel Mailing List, Mon, 28 Apr 2008 20:26:45 +0000
[4277] add format= to drive options (CVE-2008-2004)

Source: MLIST
Type: Exploit
[Qemu-devel] 20080428 [4277] add format= to drive options (CVE-2008-2004)

Source: CCN
Type: RHSA-2008-0194
Important: xen security and bug fix update

Source: CCN
Type: SA29129
KVM Block Device Backend Security Bypass

Source: SECUNIA
Type: UNKNOWN
29129

Source: SECUNIA
Type: UNKNOWN
29963

Source: CCN
Type: SA30111
QEMU "drive_init()" Disk Format Security Bypass

Source: SECUNIA
Type: Vendor Advisory
30111

Source: SECUNIA
Type: UNKNOWN
30717

Source: SECUNIA
Type: UNKNOWN
35062

Source: CCN
Type: qemu Change Log, Release 4277, Mon Apr 28 20:26:45 2008 UTC
Savannah CVS Surfing

Source: CCN
Type: QEMU SVN repository
[qemu] Revision 4277

Source: CONFIRM
Type: UNKNOWN
http://svn.savannah.gnu.org/viewvc/?view=rev&root=qemu&revision=4277

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:162

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:013

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0194

Source: BID
Type: UNKNOWN
29101

Source: CCN
Type: BID-29101
QEMU 'vl.c' Security Bypass Vulnerability

Source: CCN
Type: USN-776-1
KVM vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-776-1

Source: CCN
Type: USN-776-2
KVM regression

Source: XF
Type: UNKNOWN
qemu-driveinit-security-bypass(42268)

Source: XF
Type: UNKNOWN
qemu-driveinit-security-bypass(42268)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11021

Source: SUSE
Type: SUSE-SR:2008:013
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_virtualization:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_virtualization:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:rhel_virtualization:5::server:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20082004
    V
    CVE-2008-2004
    2015-11-16
    oval:org.mitre.oval:def:13482
    P
    USN-776-1 -- kvm vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13656
    P
    USN-776-2 -- kvm regression
    2014-06-30
    oval:org.mitre.oval:def:22720
    P
    ELSA-2008:0194: xen security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:11021
    V
    The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.
    2013-04-29
    oval:com.redhat.rhsa:def:20080194
    P
    RHSA-2008:0194: xen security and bug fix update (Important)
    2008-05-13
    oval:com.ubuntu.precise:def:20082004000
    V
    CVE-2008-2004 on Ubuntu 12.04 LTS (precise) - medium.
    2008-05-12
    oval:com.ubuntu.trusty:def:20082004000
    V
    CVE-2008-2004 on Ubuntu 14.04 LTS (trusty) - medium.
    2008-05-12
    BACK
    qemu qemu 0.9.1