Access Restriction Bypass Affecting libvirt package, versions [,0.9.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.56% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-LIBVIRT-2317425
  • published14 Dec 2021
  • disclosed15 Mar 2011
  • creditUnknown

Introduced: 15 Mar 2011

CVE-2011-1146  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade libvirt to version 0.9.0 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.

CVSS Base Scores

version 3.1