Vulnerability Name: | CVE-2011-1773 (CCN-67331) | ||||||||||||||||
Assigned: | 2010-01-23 | ||||||||||||||||
Published: | 2010-01-23 | ||||||||||||||||
Updated: | 2019-04-22 | ||||||||||||||||
Summary: | virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password. | ||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
2.7 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-255 | ||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2011-1773 Source: CCN Type: virt-v2v Web page virt-p2v and virt-v2v Source: CCN Type: RHSA-2011-1615 Low: virt-v2v security and bug fix update Source: REDHAT Type: UNKNOWN RHSA-2011:1615 Source: CCN Type: SA47086 virt-v2v Guest Conversion VNC Password Security Issue Source: SECUNIA Type: Vendor Advisory 47086 Source: CCN Type: ohloh Web site virt-v2v Source: OSVDB Type: UNKNOWN 77558 Source: CCN Type: OSVDB ID: 77558 virt-v2v Guest Conversion VNC Password Local Authentication Bypass Source: CCN Type: BID-47748 virt-v2v Disabled Target VNC Password Security Bypass Vulnerability Source: CCN Type: BID-50934 Red Hat 'virt-v2v' Package Local Privilege Escalation Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 702754 virt-v2v: vnc password protection is missing after vm conversion Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=702754 Source: XF Type: UNKNOWN virtv2v-password-security-bypass(67331) Source: CONFIRM Type: Exploit, Patch https://git.fedorahosted.org/cgit/virt-v2v.git/commit/?id=7e9393129116699d1228bb02b9f65b78584582c1 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |