CVE-2011-0011
Published Jun 21, 2012
Last updated 4 years ago
Overview
- Description
- qemu-kvm before 0.11.0 disables VNC authentication when the password is cleared, which allows remote attackers to bypass authentication and establish VNC sessions.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 6.4
- Exploitability score
- 3.2
- Vector string
- AV:A/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qemu:qemu:*:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1EA58FE-B700-4425-AA26-0E3B9EB06D57", "versionEndIncluding": "0.11.0" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC82CD08-F151-489C-9BC4-50C8C9583718" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75D04344-C6CE-40D5-97ED-42B3DBA1AAD7" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71CC4D45-66BE-4C23-B541-DD4604ACC9FF" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E41058D-380C-4098-96FB-53CC158ED420" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFE12226-C599-45A2-8CFD-32753F94204B" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C06F8832-B32F-4352-B048-A4ADCE85373E" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5278C685-988B-40D7-9AE9-B4FB8AF41C8C" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39A6382B-A08C-4D58-B3F9-D74132A74B86" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7483B9F2-246C-4B78-9EFA-7734B7209054" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A83436B8-AFC9-4AA2-8414-1F703812718D" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCA47F54-B59B-45EC-B5D4-DF544E4BE1AF" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4786DEA6-6F23-4969-B7E0-C664FCB2284E" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA3CABBB-9C1F-4ACD-A2AC-8320348DDA99" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0ED046D-26E2-4E01-BAB1-F86249A2E827" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4EF80C9-6950-412E-975F-058F20DF9F04" }, { "criteria": "cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "921698C0-DCE3-4604-8ED3-B327273D6EAD" } ], "operator": "OR" } ] } ]