4.3
CVSSv2

CVE-2014-0028

Published: 24/01/2014 Updated: 03/01/2015
CVSS v2 Base Score: 4.3 | Impact Score: 4.9 | Exploitability Score: 5.5
VMScore: 383
Vector: AV:A/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Summary

libvirt 1.1.1 up to and including 1.2.0 allows context-dependent malicious users to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat libvirt 1.1.2

redhat libvirt 1.1.4

redhat libvirt 1.1.1

redhat libvirt 1.1.3

redhat libvirt 1.2.0

Vendor Advisories

Debian Bug report logs - #735676 libvirt: CVE-2014-0028 Package: libvirt; Maintainer for libvirt is Debian Libvirt Maintainers <pkg-libvirt-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Fri, 17 Jan 2014 11:54:01 UTC Severity: important Tags: security Fixed in version li ...
Several security issues were fixed in libvirt ...
libvirt 111 through 120 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API ...