First published: Thu Jan 29 2015(Updated: )
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia | =4.0 | |
Red Hat Libvirt | <=1.2.11 | |
Red Hat Libvirt | =1.2.0 | |
Red Hat Libvirt | =1.2.1 | |
Red Hat Libvirt | =1.2.2 | |
Red Hat Libvirt | =1.2.3 | |
Red Hat Libvirt | =1.2.4 | |
Red Hat Libvirt | =1.2.5 | |
Red Hat Libvirt | =1.2.6 | |
Red Hat Libvirt | =1.2.7 | |
Red Hat Libvirt | =1.2.8 | |
Red Hat Libvirt | =1.2.9 | |
Red Hat Libvirt | =1.2.10 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0236 has been classified as a medium severity vulnerability.
To fix CVE-2015-0236, you should upgrade to libvirt version 1.2.12 or later.
CVE-2015-0236 affects libvirt versions prior to 1.2.12 and specific Mageia and Ubuntu versions.
Yes, CVE-2015-0236 can be exploited by remote authenticated users.
CVE-2015-0236 allows attackers to obtain the VNC password from the vulnerable systems.