First published: Tue Mar 20 2007(Updated: )
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Fedora Core | =core_5.0 | |
Red Hat Fedora Core | =core6 | |
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0998 is considered a medium severity vulnerability that allows unauthorized file access from the guest operating system to the host.
To fix CVE-2007-0998, update your QEMU installation to a version where this vulnerability is resolved.
Users of QEMU within Xen environments, particularly those using older versions related to Red Hat Enterprise Linux 5.0 or Fedora Core 5.0, are affected by CVE-2007-0998.
Attackers can exploit CVE-2007-0998 to read arbitrary files on the host operating system from a compromised guest operating system.
Disabling VNC access or securing the VM environment can serve as temporary workarounds for CVE-2007-0998 until a patch is applied.