Vulnerability Name:
CVE-2013-1766 (CCN-82458)
Assigned:
2013-02-26
Published:
2013-02-26
Updated:
2013-03-21
Summary:
libvirt 1.0.2 and earlier sets the group owner to kvm for device files, which allows local users to write to these files via unspecified vectors.
CVSS v3 Severity:
4.0 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
3.6 Low
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P
)
2.6 Low
(Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
Partial
2.1 Low
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
)
1.6 Low
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-264
Vulnerability Consequences:
Bypass Security
References:
Source: MITRE
Type: CNA
CVE-2013-1766
Source: CCN
Type: libvirt Web site
libvirt: The virtualization API
Source: SECUNIA
Type: Vendor Advisory
52628
Source: DEBIAN
Type: UNKNOWN
DSA-2650
Source: DEBIAN
Type: DSA-2650
libvirt -- files and device nodes ownership change to kvm group
Source: BID
Type: UNKNOWN
58178
Source: CCN
Type: BID-58178
libvirt CVE-2013-1766 Local Security Bypass Vulnerability
Source: CCN
Type: Red Hat Bugzilla Bug 915718
CVE-2013-1766 libvirt: kvm-group writable storage
Source: XF
Type: UNKNOWN
libvirt-qemukvm-security-bypass(82458)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.3:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.4:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.5:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.8:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.10:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.11:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.12:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:0.9.13:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:1.0.0:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:1.0.1:-:*:*:*:*:*:*
OR
cpe:/a:redhat:libvirt:*:*:*:*:*:*:*:*
(Version <= 1.0.2)
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.mitre.oval:def:29341
P
DSA-2650-2 -- libvirt -- files and device nodes ownership change to kvm group
2015-08-17
oval:org.mitre.oval:def:19927
P
DSA-2650-1 libvirt - files and device nodes ownership change to kvm group
2014-06-23
oval:com.ubuntu.precise:def:20131766000
V
CVE-2013-1766 on Ubuntu 12.04 LTS (precise) - low.
2013-03-20
BACK
redhat
libvirt 0.0.1
redhat
libvirt 0.0.2
redhat
libvirt 0.0.3
redhat
libvirt 0.0.4
redhat
libvirt 0.0.5
redhat
libvirt 0.0.6
redhat
libvirt 0.1.0
redhat
libvirt 0.1.1
redhat
libvirt 0.1.3
redhat
libvirt 0.1.4
redhat
libvirt 0.1.5
redhat
libvirt 0.1.6
redhat
libvirt 0.1.7
redhat
libvirt 0.1.8
redhat
libvirt 0.1.9
redhat
libvirt 0.2.0
redhat
libvirt 0.2.1
redhat
libvirt 0.2.2
redhat
libvirt 0.2.3
redhat
libvirt 0.3.0
redhat
libvirt 0.3.1
redhat
libvirt 0.3.2
redhat
libvirt 0.3.3
redhat
libvirt 0.4.0
redhat
libvirt 0.4.1
redhat
libvirt 0.4.2
redhat
libvirt 0.4.3
redhat
libvirt 0.4.4
redhat
libvirt 0.4.5
redhat
libvirt 0.4.6
redhat
libvirt 0.5.0
redhat
libvirt 0.5.1
redhat
libvirt 0.6.0
redhat
libvirt 0.6.1
redhat
libvirt 0.6.2
redhat
libvirt 0.6.3
redhat
libvirt 0.6.4
redhat
libvirt 0.6.5
redhat
libvirt 0.7.0
redhat
libvirt 0.7.1
redhat
libvirt 0.7.2
redhat
libvirt 0.7.3
redhat
libvirt 0.7.4
redhat
libvirt 0.7.5
redhat
libvirt 0.7.6
redhat
libvirt 0.7.7
redhat
libvirt 0.8.0
redhat
libvirt 0.8.1
redhat
libvirt 0.8.2
redhat
libvirt 0.8.3
redhat
libvirt 0.8.4
redhat
libvirt 0.8.5
redhat
libvirt 0.8.6
redhat
libvirt 0.8.7
redhat
libvirt 0.8.8
redhat
libvirt 0.9.0
redhat
libvirt 0.9.1
redhat
libvirt 0.9.2
redhat
libvirt 0.9.3
redhat
libvirt 0.9.4
redhat
libvirt 0.9.5
redhat
libvirt 0.9.6
redhat
libvirt 0.9.7
redhat
libvirt 0.9.8
redhat
libvirt 0.9.9
redhat
libvirt 0.9.10
redhat
libvirt 0.9.11
redhat
libvirt 0.9.12
redhat
libvirt 0.9.13
redhat
libvirt 1.0.0
redhat
libvirt 1.0.1
redhat
libvirt *