CVE-2013-2007
Published May 21, 2013
Last updated 2 years ago
Overview
- Description
- The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59B3B915-1606-48E4-9EFC-BD9D6A6D404A" } ], "operator": "OR" } ] } ]