Lucene search

K
xenXen ProjectXSA-51
HistoryMay 06, 2013 - 3:00 p.m.

qemu guest agent (qga) insecure file permissions

2013-05-0615:00:00
Xen Project
xenbits.xen.org
67

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

ISSUE DESCRIPTION

The qemu guest agent creates files with insecure permissions when started in daemon mode.

IMPACT

The qemu guest agent is not used by default in Xen systems.
If it is used in a particular guest, unprivileged guest processes might be able to escalate their privilege to that of the guest.

VULNERABLE SYSTEMS

We are not aware of any Xen installations using the qemu guest agent.
However, the program is built and installed (as the executable `qemu-ga’) as part of the Xen management tools by the Xen build system. It is possible that a system administrator, or downstream system integrator, might have arranged to execute qemu-ga.
If you have not taken steps to run qemu-ga, you are not vulnerable.

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%