Vulnerability Details : CVE-2014-7823
The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
Exploit prediction scoring system (EPSS) score for CVE-2014-7823
Probability of exploitation activity in the next 30 days: 0.57%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 75 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-7823
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-7823
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7823
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html
openSUSE-SU-2014:1471-1: moderate: Security update for libvirt
-
http://www.ubuntu.com/usn/USN-2404-1
USN-2404-1: libvirt vulnerabilities | Ubuntu security noticesVendor Advisory
-
http://secunia.com/advisories/62058
Sign in
-
http://security.gentoo.org/glsa/glsa-201412-04.xml
libvirt: Multiple vulnerabilities (GLSA 201412-04) — Gentoo security
-
http://security.libvirt.org/2014/0007.html
Libvirt Security Notice: LSN-2014-0007Patch;Vendor Advisory
Products affected by CVE-2014-7823
- cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*