187
VMScore

CVE-2015-5160

Published: 20/08/2018 Updated: 15/10/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

libvirt prior to 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libvirt libvirt

redhat enterprise linux server eus 7.3

redhat enterprise linux workstation 7.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.6

redhat enterprise linux server aus 7.4

redhat enterprise linux server aus 7.3

redhat enterprise linux server tus 7.6

redhat enterprise linux server 7.0

redhat enterprise linux server eus 7.5

redhat enterprise linux eus 7.6

redhat enterprise linux eus 7.4

redhat enterprise linux 6.0

redhat enterprise linux server eus 7.6

redhat enterprise linux server eus 7.4

redhat virtualization 3.0

redhat enterprise linux eus 7.5

redhat enterprise linux eus 7.3

redhat enterprise linux server tus 7.3

redhat enterprise linux 5

Vendor Advisories

Synopsis Moderate: libvirt security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for libvirt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sy ...
Debian Bug report logs - #796111 CVE-2015-5160 Package: src:libvirt; Maintainer for src:libvirt is Debian Libvirt Maintainers <pkg-libvirt-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 19 Aug 2015 14:57:02 UTC Severity: normal Tags: security Found in versions libvi ...
It was found that the libvirt daemon, when using RBD (RADOS Block Device), leaked private credentials to the process list A local attacker could use this flaw to perform certain privileged operations within the cluster ...