Rapid7 Vulnerability & Exploit Database

RHSA-2009:0382: libvirt security update

Back to Search

RHSA-2009:0382: libvirt security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
12/19/2008
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

libvirt is a C API for managing and interacting with the virtualizationcapabilities of Linux and other operating systems. libvirt also providestools for remotely managing virtualized systems.The libvirtd daemon was discovered to not properly check user connectionpermissions before performing certain privileged actions, such asrequesting migration of an unprivileged guest domain to another system. Alocal user able to establish a read-only connection to libvirtd could usethis flaw to perform actions that should be restricted to read-writeconnections. (CVE-2008-5086)libvirt_proxy, a setuid helper application allowing non-privileged users tocommunicate with the hypervisor, was discovered to not properly validateuser requests. Local users could use this flaw to cause a stack-basedbuffer overflow in libvirt_proxy, possibly allowing them to run arbitrarycode with root privileges. (CVE-2009-0036)All users are advised to upgrade to these updated packages, which containbackported patches which resolve these issues. After installing the update,libvirtd must be restarted manually (for example, by issuing a "servicelibvirtd restart" command), and guest systems rebooted, for this change totake effect.

Solution(s)

  • redhat-upgrade-libvirt
  • redhat-upgrade-libvirt-devel
  • redhat-upgrade-libvirt-python

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;