Vulnerability Name:

CVE-2015-5160 (CCN-119071)

Assigned:2015-08-10
Published:2015-08-10
Updated:2020-10-15
Summary:libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
3.3 Low (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
2.9 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2015-5160

Source: CCN
Type: RHSA-2016-2577
Moderate: libvirt security, bug fix, and enhancement update

Source: REDHAT
Type: Third Party Advisory
RHSA-2016:2577

Source: CCN
Type: IBM Security Bulletin T1024827 (PowerKVM)
A vulnerability in libvirt affects PowerKVM

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20170721 [OSSN-0078] Ceph credentials included in logs using older versions of libvirt/qemu

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
https://bugs.launchpad.net/ossn/+bug/1686743

Source: CCN
Type: Red Hat Bugzilla – Bug 1245647
Bug 1245647 - (CVE-2015-5160) CVE-2015-5160 libvirt: Ceph id/key leaked in the process list

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1245647

Source: XF
Type: UNKNOWN
libvirt-cve20155160-info-disc(119071)

Source: CONFIRM
Type: Third Party Advisory
https://wiki.openstack.org/wiki/OSSN/OSSN-0079

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-5160

Vulnerable Configuration:Configuration 1:
  • cpe:/a:libvirt:libvirt:*:*:*:*:*:*:*:* (Version < 2.2)

  • Configuration 2:
  • cpe:/a:redhat:virtualization:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:storage:3.1:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:storage:3.1:server:el7:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:7::hypervisor:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:libvirt:libvirt:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.xenial:def:20155160000
    V
    CVE-2015-5160 on Ubuntu 16.04 LTS (xenial) - low.
    2018-08-20
    oval:com.ubuntu.xenial:def:201551600000000
    V
    CVE-2015-5160 on Ubuntu 16.04 LTS (xenial) - low.
    2018-08-20
    oval:com.ubuntu.trusty:def:20155160000
    V
    CVE-2015-5160 on Ubuntu 14.04 LTS (trusty) - low.
    2018-08-20
    oval:com.redhat.rhsa:def:20162577
    P
    RHSA-2016:2577: libvirt security, bug fix, and enhancement update (Moderate)
    2016-11-03
    oval:com.ubuntu.artful:def:20155160000
    V
    CVE-2015-5160 on Ubuntu 17.10 (artful) - low.
    2016-07-06
    oval:com.ubuntu.precise:def:20155160000
    V
    CVE-2015-5160 on Ubuntu 12.04 LTS (precise) - low.
    2016-07-06
    BACK
    libvirt libvirt *
    redhat virtualization 3.0
    redhat enterprise linux 5
    redhat enterprise linux 6.0
    redhat enterprise linux desktop 7.0
    redhat enterprise linux eus 7.3
    redhat enterprise linux eus 7.4
    redhat enterprise linux eus 7.5
    redhat enterprise linux eus 7.6
    redhat enterprise linux server 7.0
    redhat enterprise linux server aus 7.3
    redhat enterprise linux server aus 7.4
    redhat enterprise linux server aus 7.6
    redhat enterprise linux server eus 7.3
    redhat enterprise linux server eus 7.4
    redhat enterprise linux server eus 7.5
    redhat enterprise linux server eus 7.6
    redhat enterprise linux server tus 7.3
    redhat enterprise linux server tus 7.6
    redhat enterprise linux workstation 7.0
    libvirt libvirt *
    ibm powerkvm 2.1
    ibm powerkvm 3.1
    redhat enterprise linux desktop 7
    redhat enterprise linux hpc node 7
    redhat enterprise linux server 7
    redhat enterprise linux workstation 7