Vulnerability Details : CVE-2014-0028
libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
Products affected by CVE-2014-0028
- cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0028
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0028
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:A/AC:M/Au:N/C:P/I:N/A:P |
5.5
|
4.9
|
NIST |
CWE ids for CVE-2014-0028
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0028
-
https://bugzilla.redhat.com/show_bug.cgi?id=1048637
1048637 – (CVE-2014-0028) CVE-2014-0028 libvirt: event registration bypasses domain:getattr ACLVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html
openSUSE-SU-2014:0268-1: moderate: update for libvirt
-
http://security.gentoo.org/glsa/glsa-201412-04.xml
libvirt: Multiple vulnerabilities (GLSA 201412-04) — Gentoo security
-
https://www.redhat.com/archives/libvir-list/2014-January/msg00684.html
[libvirt] [PATCH 0/4] CVE-2014-0028: domain events vs. ACL filtering
-
http://libvirt.org/news.html
libvirt: Releases
-
http://www.ubuntu.com/usn/USN-2093-1
USN-2093-1: libvirt vulnerabilities | Ubuntu security notices
-
http://secunia.com/advisories/60895
Runtime Error
Jump to