Vulnerability Details : CVE-2008-1945
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
Products affected by CVE-2008-1945
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
Threat overview for CVE-2008-1945
Top countries where our scanners detected CVE-2008-1945
Top open port discovered on systems with this issue
5555
IPs affected by CVE-2008-1945 121
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-1945!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-1945
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1945
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
References for CVE-2008-1945
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
MandrivaThird Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44269
QEMU image security bypass CVE-2008-1945 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:008 - openSUSE Security Announce - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://secunia.com/advisories/32063
About Secunia Research | FlexeraThird Party Advisory
-
http://www.securitytracker.com/id?1020959
Access DeniedThird Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905
404 Not FoundThird Party Advisory
-
http://secunia.com/advisories/35062
About Secunia Research | FlexeraThird Party Advisory
-
http://secunia.com/advisories/34642
About Secunia Research | FlexeraThird Party Advisory
-
http://secunia.com/advisories/32088
About Secunia Research | FlexeraThird Party Advisory
-
http://secunia.com/advisories/35031
About Secunia Research | FlexeraThird Party Advisory
-
http://www.debian.org/security/2009/dsa-1799
[SECURITY] [DSA 1799-1] New qemu packages fix several vulnerabilitiesThird Party Advisory
-
http://www.securityfocus.com/bid/30604
Third Party Advisory;VDB Entry
-
https://rhn.redhat.com/errata/RHSA-2008-0892.html
RHSA-2008:0892 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.ubuntu.com/usn/usn-776-1
USN-776-1: KVM vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
Jump to