Vulnerability Name:

CVE-2011-1773 (CCN-67331)

Assigned:2010-01-23
Published:2010-01-23
Updated:2019-04-22
Summary:virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
3.2 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
3.7 Low (REDHAT CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
2.7 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-255
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2011-1773

Source: CCN
Type: virt-v2v Web page
virt-p2v and virt-v2v

Source: CCN
Type: RHSA-2011-1615
Low: virt-v2v security and bug fix update

Source: REDHAT
Type: UNKNOWN
RHSA-2011:1615

Source: CCN
Type: SA47086
virt-v2v Guest Conversion VNC Password Security Issue

Source: SECUNIA
Type: Vendor Advisory
47086

Source: CCN
Type: ohloh Web site
virt-v2v

Source: OSVDB
Type: UNKNOWN
77558

Source: CCN
Type: OSVDB ID: 77558
virt-v2v Guest Conversion VNC Password Local Authentication Bypass

Source: CCN
Type: BID-47748
virt-v2v Disabled Target VNC Password Security Bypass Vulnerability

Source: CCN
Type: BID-50934
Red Hat 'virt-v2v' Package Local Privilege Escalation Vulnerability

Source: CCN
Type: Red Hat Bugzilla Bug 702754
virt-v2v: vnc password protection is missing after vm conversion

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=702754

Source: XF
Type: UNKNOWN
virtv2v-password-security-bypass(67331)

Source: CONFIRM
Type: Exploit, Patch
https://git.fedorahosted.org/cgit/virt-v2v.git/commit/?id=7e9393129116699d1228bb02b9f65b78584582c1

Vulnerable Configuration:Configuration 1:
  • cpe:/a:matthew_booth:virt-v2v:0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.4.10:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:0.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:matthew_booth:virt-v2v:*:*:*:*:*:*:*:* (Version <= 0.8.3)

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:27993
    P
    ELSA-2011-1615 -- virt-v2v security and bug fix update (low)
    2014-12-15
    oval:org.mitre.oval:def:26996
    P
    RHSA-2011:1615 -- virt-v2v security and bug fix update (Low)
    2014-12-08
    oval:com.redhat.rhsa:def:20111615
    P
    RHSA-2011:1615: virt-v2v security and bug fix update (Low)
    2011-12-06
    BACK
    matthew_booth virt-v2v 0.1.0
    matthew_booth virt-v2v 0.2.0
    matthew_booth virt-v2v 0.3.0
    matthew_booth virt-v2v 0.3.2
    matthew_booth virt-v2v 0.4.0
    matthew_booth virt-v2v 0.4.9
    matthew_booth virt-v2v 0.4.10
    matthew_booth virt-v2v 0.5.0
    matthew_booth virt-v2v 0.5.1
    matthew_booth virt-v2v 0.5.2
    matthew_booth virt-v2v 0.5.3
    matthew_booth virt-v2v 0.5.4
    matthew_booth virt-v2v 0.6.0
    matthew_booth virt-v2v 0.6.1
    matthew_booth virt-v2v 0.6.2
    matthew_booth virt-v2v 0.6.3
    matthew_booth virt-v2v 0.7.0
    matthew_booth virt-v2v 0.7.1
    matthew_booth virt-v2v 0.8.0
    matthew_booth virt-v2v 0.8.1
    matthew_booth virt-v2v 0.8.2
    matthew_booth virt-v2v *
    redhat enterprise linux 6.0