First published: Fri Aug 08 2008(Updated: )
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | =0.9.0 | |
SUSE Linux | =11.1 | |
SUSE Linux | =11.0 | |
SUSE Linux | =10.3 | |
SUSE Linux Enterprise Server | =11 | |
SUSE Linux Enterprise Server | =10 | |
Debian | =5.0 | |
Debian | =4.0 | |
Ubuntu | =8.10 | |
Ubuntu | =8.04 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server EUS | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1945 is considered a high severity vulnerability as it allows guest OS users to read arbitrary files on the host OS.
To fix CVE-2008-1945, upgrade QEMU to a version that has addressed this vulnerability.
CVE-2008-1945 specifically affects QEMU version 0.9.0.
Systems running QEMU 0.9.0 on various distributions like openSUSE, Debian, Ubuntu, and Red Hat are vulnerable to CVE-2008-1945.
Exploiting CVE-2008-1945 allows an attacker to access files on the host operating system from a guest OS, leading to potential data exposure.