First published: Thu Apr 14 2016(Updated: )
The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =15.10 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =0.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4600 is rated as a medium-severity vulnerability due to its potential to allow remote attackers to bypass access restrictions.
To fix CVE-2011-4600, upgrade libvirt to version 0.9.9 or later, or apply relevant security patches provided by your Linux distribution.
CVE-2011-4600 affects multiple versions of Ubuntu and Red Hat Libvirt, specifically libvirt versions before 0.9.9 and various Ubuntu LTS releases.
CVE-2011-4600 can be exploited through crafted DNS or DHCP queries that may allow remote attackers to bypass firewall rules.
CVE-2011-4600 was disclosed in 2011 and affects older versions of libvirt software.