CVE-2017-1000256

Related Vulnerabilities: CVE-2017-1000256  

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.

The MITRE CVE dictionary describes this issue as:

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.

Find out more about CVE-2017-1000256 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Affected Packages State

Platform Package State
Red Hat Gluster Storage 3 libvirt Not affected
Red Hat Enterprise Linux 7 libvirt Will not fix
Red Hat Enterprise Linux 6 libvirt Will not fix
Red Hat Enterprise Linux 5 libvirt Will not fix
RHEV Manager 3 mingw-virt-viewer Will not fix

Acknowledgements

This issue was discovered by Daniel P. Berrange (Red Hat).