Vulnerability Name: | CVE-2010-0429 (CCN-61263) | ||||||||||||||||
Assigned: | 2010-08-19 | ||||||||||||||||
Published: | 2010-08-19 | ||||||||||||||||
Updated: | 2010-08-25 | ||||||||||||||||
Summary: | libspice, as used in QEMU-KVM in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and qspice 0.3.0, does not properly restrict the addresses upon which memory-management actions are performed, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors. | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||||||||||
CVSS v2 Severity: | 6.6 Medium (CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C) 4.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
4.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
4.9 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||
References: | Source: CCN Type: QEMU Web page QEMU Source: MITRE Type: CNA CVE-2010-0429 Source: CCN Type: RHSA-2010-0622 Important: rhev-hypervisor security and bug fix update Source: CCN Type: RHSA-2010-0633 Important: qspice security update Source: CCN Type: OSVDB ID: 67476 QEMU-KVM Hypervisor libspice Memory Management Address Restriction Bypass Guest OS DoS Source: CCN Type: BID-42583 QEMU KVM 'libspice' Component CVE-2010-0429 Local Privilege Escalation Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 568701 CVE-2010-0429 libspice: Relying on guest provided data structures to indicate memory allocation Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=568701 Source: XF Type: UNKNOWN qemu-libspice-privilege-escalation(61263) Source: REDHAT Type: Patch, Vendor Advisory RHSA-2010:0622 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2010:0633 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |