First published: Thu Nov 13 2014(Updated: )
The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | <=1.2.10 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.0 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.1 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.2 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.3 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.4 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.5 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.6 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.7 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.8 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =1.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7823 is considered a moderate severity vulnerability.
To fix CVE-2014-7823, upgrade Libvirt to version 1.2.11 or later.
CVE-2014-7823 affects users running Libvirt versions before 1.2.11.
CVE-2014-7823 exploits the virDomainGetXMLDesc API to leak the VNC password.
Mitigation of CVE-2014-7823 without updating is challenging, but limiting user permissions may help.