First published: Mon May 13 2013(Updated: )
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1922 is considered a medium severity vulnerability due to the capability of local guest OS administrators to read arbitrary files on the host.
To fix CVE-2013-1922, update your QEMU and Xen installations to versions later than 4.2.2 that address this vulnerability.
CVE-2013-1922 affects users running Xen versions 4.2.0, 4.2.1, and 4.2.2 on systems that utilize qemu-nbd.
Systems using Xen hypervisor versions 4.2.x, which employ qemu-nbd for disk image management, are potentially vulnerable to CVE-2013-1922.
The impact of CVE-2013-1922 allows unauthorized access to host files by exploiting the disk image header modification ability.