Vulnerability CVE-2007-0998


Published: 2007-03-20   Modified: 2012-02-12

Description:
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.

Type:

CWE-noinfo

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
XEN -> QEMU 

 References:
http://rhn.redhat.com/errata/RHSA-2007-0114.html
http://xforce.iss.net/xforce/xfdb/33085
http://www.vupen.com/english/advisories/2007/1021
http://www.vupen.com/english/advisories/2007/1020
http://www.vupen.com/english/advisories/2007/1019
http://www.securitytracker.com/id?1017764
http://www.securityfocus.com/bid/22967
http://secunia.com/advisories/51413
http://secunia.com/advisories/24575
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10486
http://osvdb.org/34304
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

Copyright 2024, cxsecurity.com

 

Back to Top