CVE-2013-6456
Published Apr 15, 2014
Last updated 2 years ago
Overview
- Description
- The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 7.8
- Exploitability score
- 4.4
- Vector string
- AV:A/AC:M/Au:S/C:N/I:P/A:C
Weaknesses
- nvd@nist.gov
- CWE-59
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DDA1805-ED8A-44AA-96FF-E676D278CCFD" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBD82EEA-279F-42CA-8F4C-A4D57EEBAB0D" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "320C2182-DBCF-4564-940A-D12673C73543" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB635DBE-29F1-4055-A064-42539FC811C4" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67B77F63-C9AC-42D4-B9E2-4BBE196AC254" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3256288E-5A49-4DCD-AE30-6B4E21AEF970" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25E764AE-3B7C-4378-97C5-10E835511684" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49FEFFA5-371E-4B1D-AAAE-C71AEB79A4AF" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F982F65C-CBF9-4EE6-8FD6-C965141E42C9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4BF8152-79A4-48C6-88EB-9D3FA7466844" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E4DCDE-4D85-4339-99CB-70A464FA2EE9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E03AF346-6F4E-4BEA-B29E-9C9C04148843" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54FAE380-0E7E-4468-A07B-5A9A3504F681" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB4B1021-4D01-4D86-AED4-0418F8839FD6" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "380686BB-7212-4285-BA00-B8EEAC6E1CC9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A331072-326A-4E72-84E2-E0424E6DDE30" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB1666DD-AC49-477A-921C-8197F5EFECA6" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "527B9236-CA4E-42A8-8C7A-2FB92BE2B4B9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA9572AC-1D6D-4AA1-AEF0-CB9143F38215" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9" } ], "operator": "OR" } ] } ]