Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2020.2209
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for libvirt (EulerOS-SA-2020-2209)
Summary:The remote host is missing an update for the Huawei EulerOS; 'libvirt' package(s) announced via the EulerOS-SA-2020-2209 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS
'libvirt' package(s) announced via the EulerOS-SA-2020-2209 advisory.

Vulnerability Insight:
Security Fix(es):

qemu/qemu_driver.c in libvirt before 6.0.0 mishandles the holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage).(CVE-2019-20485)

It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.(CVE-2019-10161)

The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an 'emulatorbin' argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.(CVE-2019-10167)

util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.(CVE-2018-6764)

Affected Software/OS:
'libvirt' package(s) on Huawei EulerOS Virtualization 3.0.2.2.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-6764
Debian Security Information: DSA-4137 (Google Search)
https://www.debian.org/security/2018/dsa-4137
https://www.redhat.com/archives/libvir-list/2018-February/msg00239.html
RedHat Security Advisories: RHSA-2018:3113
https://access.redhat.com/errata/RHSA-2018:3113
http://www.ubuntu.com/usn/USN-3576-1
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.