Vulnerability Details : CVE-2020-10703
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2020-10703
- cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-10703
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-10703
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
Red Hat, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
Red Hat, Inc. | 2024-04-01 |
CWE ids for CVE-2020-10703
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2020-10703
-
https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=7aa0e8c0cb8a6293d0c6f7e3d29c13b96dec2129
libvirt · GitLab
-
https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=dfff16a7c261f8d28e3abe60a47165f845fa952f
libvirt · GitLab
-
https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5d5c732d748d644ec14626bce448e84bdc4bd93e
libvirt · GitLab
-
https://security.netapp.com/advisory/ntap-20200608-0005/
CVE-2020-10703 Libvirt Vulnerability in NetApp Products | NetApp Product Security
-
https://bugzilla.redhat.com/show_bug.cgi?id=1790725
1790725 – Libvirtd SIGSEGV on the condition that look up by target path '' when there is active pool without target pathExploit;Issue Tracking;Vendor Advisory
-
https://libvirt.org/git/?p=libvirt.git;a=commit;h=7aa0e8c0cb8a6293d0c6f7e3d29c13b96dec2129
libvirt.org Git - libvirt.git/commitPatch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/
[SECURITY] Fedora 31 Update: libvirt-5.6.0-7.fc31 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/
[SECURITY] Fedora 31 Update: libvirt-5.6.0-7.fc31 - package-announce - Fedora Mailing-Lists
-
https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
[SECURITY] [DLA 3778-1] libvirt security update
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10703
1816650 – (CVE-2020-10703) CVE-2020-10703 libvirt: Potential denial of service via active pool without target pathIssue Tracking;Patch;Vendor Advisory
-
https://libvirt.org/git/?p=libvirt.git;a=commit;h=dfff16a7c261f8d28e3abe60a47165f845fa952f
libvirt.org Git - libvirt.git/commitPatch;Vendor Advisory
-
https://libvirt.org/git/?p=libvirt.git;a=commit;h=5d5c732d748d644ec14626bce448e84bdc4bd93e
libvirt.org Git - libvirt.git/commitPatch;Vendor Advisory
Jump to