First published: Wed Apr 24 2013(Updated: )
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2007 is classified as a medium severity vulnerability due to its potential for local users to gain unauthorized access.
To fix CVE-2013-2007, update your QEMU to version 1.4.2 or later where file permissions have been properly secured.
CVE-2013-2007 affects QEMU versions 1.4.1 and earlier when running in daemon mode.
CVE-2013-2007 allows local users to read and write to certain files due to weak file permissions.
Yes, a patch has been implemented in QEMU version 1.4.2 and later to address CVE-2013-2007's vulnerabilities.