Access Restriction Bypass Affecting libvirt package, versions [,6.2.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-LIBVIRT-2317459
  • published14 Dec 2021
  • disclosed27 May 2021
  • creditUnknown

Introduced: 27 May 2021

CVE-2020-10701  (opens in a new tab)
CWE-862  (opens in a new tab)

How to fix?

Upgrade libvirt to version 6.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set, this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero, potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.

CVSS Scores

version 3.1