Vulnerability Details : CVE-2014-0189
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
Exploit prediction scoring system (EPSS) score for CVE-2014-0189
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0189
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2014-0189
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0189
-
http://rhn.redhat.com/errata/RHSA-2015-0430.html
RHSA-2015:0430 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/04/28/2
oss-security - CVE-2014-0189: /etc/sysconfig/virt-who is world-readable (contains unencrypted passwords)Mailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1081286
1081286 – [RFE] Cannot add unencrypted administrative credentials of Vcenter in "/etc/sysconfig/virt-who"Issue Tracking
-
http://www.securityfocus.com/bid/67089
virt-who CVE-2014-0189 Local Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=1088732
1088732 – (CVE-2014-0189) CVE-2014-0189 virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration fileIssue Tracking
Products affected by CVE-2014-0189
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:virt-who_project:virt-who:-:*:*:*:*:*:*:*