CVE-2010-2242
Published Aug 19, 2010
Last updated 14 years ago
Overview
- Description
- Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:libvirt:libvirt:0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A4629E1-113F-4F7B-A7C2-EE280FE66CD8" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62E7035D-178C-4591-A721-BE99D9D2775A" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "577AD17E-3FEA-4153-8331-A0E0BD50580A" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE09A468-889E-4D64-B125-67B042BE6820" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EE2A109-7960-44DE-96D0-B580BF87E1FD" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D18D732-E2F1-48AF-97DE-E5B149FAFE26" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E86FE3D-BC93-49DE-8D34-61C17072D190" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB95BD9D-A6B5-47B9-B2B0-9C4CC67BA62F" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "354A210C-B8C7-4E99-8EF4-EB4930B769AF" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DA90AC2-B415-42F5-86E5-9564F4133A53" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29FBE340-26FF-4D72-99C3-423786A2095B" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "072EDB8A-DBCE-490A-8BAE-106A385FBB53" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEE4570C-3EED-409D-AC79-ED4741087CEA" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01BFB306-AF97-460F-9D26-9CF53018280D" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5D9844D-5B89-4B47-9E38-BDF0C44D1BAB" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4BA9E6F-7F06-4341-928A-5CE6C5EAAA7A" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49C0A68D-E8D2-47CD-BEB0-24556A20C78F" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9543A7ED-BCFE-4153-96CB-AA2625C12394" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45408F0A-6A45-4E2E-A790-3FE00EDFF470" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D222C1F-65A4-4D04-8266-A77E7D06A0B4" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16C34138-85A3-4FF9-8978-F4F80E8476B9" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE578174-7026-4D7A-8CC9-24A29136C32E" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35E44DBE-E780-4AC4-82E5-AB1A94EACBCF" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6AC4559-DFF0-45BA-8035-9BDF3BE44C77" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C7F2E72-C436-46A4-A4B9-9F2B567FE8A0" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D1EBC94-5CB9-4B5A-9CB3-C10DE191AE3B" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05461C68-1BA6-4BA5-97F1-D56E0A62A37F" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6507C31-9F5F-488D-9D0D-C233CA1DED01" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3199D614-94CD-4E12-9127-4459BB6A84FB" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC2EE32A-68DF-4343-A5B1-6861324E592B" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "330BFC7B-1971-42C3-BBB5-1498B112E8DC" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39D87F93-98FE-414B-8D32-C9AB853A235D" }, { "criteria": "cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B38AB6E8-DE2F-426C-A8E9-2572611AE5E1" } ], "operator": "OR" } ] } ]