First published: Sun Aug 03 2014(Updated: )
libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT from CVE-2014-0179 per ADT3 due to different affected versions of some vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization | =3.0 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.0 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.1 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.2 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.3 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.4 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5.1 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5.2 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5.3 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5.4 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5.5 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.5.6 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.0.6 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.1.0 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.1.1 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.1.2 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.1.3 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.1.4 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.0 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.1 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.2 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.3 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5177 has a medium severity rating due to its potential for local users to read arbitrary files.
To fix CVE-2014-5177, upgrade libvirt to version 1.2.5 or later.
CVE-2014-5177 affects local users of libvirt versions 1.0.0 through 1.2.x before 1.2.5.
Vulnerable systems include Red Hat Enterprise Virtualization 3.0 and openSUSE versions 12.3 and 13.1.
CVE-2014-5177 exploits fine-grained access control settings to allow unauthorized file access via crafted XML documents.