Vulnerabilities > CVE-2014-0189 - Cryptographic Issues vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-0430.NASL
    descriptionAn updated virt-who package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The virt-who package provides an agent that collects information about virtual guests present in the system and reports them to the subscription manager. It was discovered that the /etc/sysconfig/virt-who configuration file, which may contain hypervisor authentication credentials, was world-readable. A local user could use this flaw to obtain authentication credentials from this file. (CVE-2014-0189) Red Hat would like to thank Sal Castiglione for reporting this issue. The virt-who package has been upgraded to upstream version 0.11, which provides a number of bug fixes and enhancements over the previous version. The most notable bug fixes and enhancements include : * Support for remote libvirt. * A fix for using encrypted passwords. * Bug fixes and enhancements that increase the stability of virt-who. (BZ#1122489) This update also fixes the following bugs : * Prior to this update, the virt-who agent failed to read the list of virtual guests provided by the VDSM daemon. As a consequence, when in VDSM mode, the virt-who agent was not able to send updates about virtual guests to Subscription Asset Manager (SAM) and Red Hat Satellite. With this update, the agent reads the list of guests when in VDSM mode correctly and reports to SAM and Satellite as expected. (BZ#1153405) * Previously, virt-who used incorrect information when connecting to Red Hat Satellite 5. Consequently, virt-who could not connect to Red Hat Satellite 5 servers. The incorrect parameter has been corrected, and virt-who can now successfully connect to Red Hat Satellite 5. (BZ#1158859) * Prior to this update, virt-who did not decode the hexadecimal representation of a password before decrypting it. As a consequence, the decrypted password did not match the original password, and attempts to connect using the password failed. virt-who has been updated to decode the encrypted password and, as a result, virt-who now handles storing credentials using encrypted passwords as expected. (BZ#1161607) In addition, this update adds the following enhancement : * With this update, virt-who is able to read the list of guests from a remote libvirt hypervisor. (BZ#1127965) Users of virt-who are advised to upgrade to this updated package, which corrects these issues and adds these enhancements.
    last seen2020-06-01
    modified2020-06-02
    plugin id81895
    published2015-03-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81895
    titleCentOS 7 : virt-who (CESA-2015:0430)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:0430 and 
    # CentOS Errata and Security Advisory 2015:0430 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81895);
      script_version("1.5");
      script_cvs_date("Date: 2020/01/02");
    
      script_cve_id("CVE-2014-0189");
      script_xref(name:"RHSA", value:"2015:0430");
    
      script_name(english:"CentOS 7 : virt-who (CESA-2015:0430)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated virt-who package that fixes one security issue, several
    bugs, and adds various enhancements is now available for Red Hat
    Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available from the
    CVE link in the References section.
    
    The virt-who package provides an agent that collects information about
    virtual guests present in the system and reports them to the
    subscription manager.
    
    It was discovered that the /etc/sysconfig/virt-who configuration file,
    which may contain hypervisor authentication credentials, was
    world-readable. A local user could use this flaw to obtain
    authentication credentials from this file. (CVE-2014-0189)
    
    Red Hat would like to thank Sal Castiglione for reporting this issue.
    
    The virt-who package has been upgraded to upstream version 0.11, which
    provides a number of bug fixes and enhancements over the previous
    version. The most notable bug fixes and enhancements include :
    
    * Support for remote libvirt.
    
    * A fix for using encrypted passwords.
    
    * Bug fixes and enhancements that increase the stability of virt-who.
    (BZ#1122489)
    
    This update also fixes the following bugs :
    
    * Prior to this update, the virt-who agent failed to read the list of
    virtual guests provided by the VDSM daemon. As a consequence, when in
    VDSM mode, the virt-who agent was not able to send updates about
    virtual guests to Subscription Asset Manager (SAM) and Red Hat
    Satellite. With this update, the agent reads the list of guests when
    in VDSM mode correctly and reports to SAM and Satellite as expected.
    (BZ#1153405)
    
    * Previously, virt-who used incorrect information when connecting to
    Red Hat Satellite 5. Consequently, virt-who could not connect to Red
    Hat Satellite 5 servers. The incorrect parameter has been corrected,
    and virt-who can now successfully connect to Red Hat Satellite 5.
    (BZ#1158859)
    
    * Prior to this update, virt-who did not decode the hexadecimal
    representation of a password before decrypting it. As a consequence,
    the decrypted password did not match the original password, and
    attempts to connect using the password failed. virt-who has been
    updated to decode the encrypted password and, as a result, virt-who
    now handles storing credentials using encrypted passwords as expected.
    (BZ#1161607)
    
    In addition, this update adds the following enhancement :
    
    * With this update, virt-who is able to read the list of guests from a
    remote libvirt hypervisor. (BZ#1127965)
    
    Users of virt-who are advised to upgrade to this updated package,
    which corrects these issues and adds these enhancements."
      );
      # https://lists.centos.org/pipermail/centos-cr-announce/2015-March/001834.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?53b245c5"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected virt-who package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0189");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:virt-who");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 7.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"virt-who-0.11-5.el7")) flag++;
    
    
    if (flag)
    {
      cr_plugin_caveat = '\n' +
        'NOTE: The security advisory associated with this vulnerability has a\n' +
        'fixed package version that may only be available in the continuous\n' +
        'release (CR) repository for CentOS, until it is present in the next\n' +
        'point release of CentOS.\n\n' +
    
        'If an equal or higher package level does not exist in the baseline\n' +
        'repository for your major version of CentOS, then updates from the CR\n' +
        'repository will need to be applied in order to address the\n' +
        'vulnerability.\n';
      security_report_v4(
        port       : 0,
        severity   : SECURITY_NOTE,
        extra      : rpm_report_get() + cr_plugin_caveat
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "virt-who");
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150305_VIRT_WHO_ON_SL7_X.NASL
    descriptionIt was discovered that the /etc/sysconfig/virt-who configuration file, which may contain hypervisor authentication credentials, was world- readable. A local user could use this flaw to obtain authentication credentials from this file. (CVE-2014-0189) The virt-who package has been upgraded to upstream version 0.11, which provides a number of bug fixes and enhancements over the previous version. The most notable bug fixes and enhancements include : - Support for remote libvirt. - A fix for using encrypted passwords. - Bug fixes and enhancements that increase the stability of virt-who. This update also fixes the following bugs : - Prior to this update, the virt-who agent failed to read the list of virtual guests provided by the VDSM daemon. As a consequence, when in VDSM mode, the virt-who agent was not able to send updates about virtual guests to Subscription Asset Manager (SAM) and Satellite. With this update, the agent reads the list of guests when in VDSM mode correctly and reports to SAM and Satellite as expected. - Previously, virt-who used incorrect information when connecting to Satellite 5. Consequently, virt-who could not connect to Satellite 5 servers. The incorrect parameter has been corrected, and virt- who can now successfully connect to Satellite 5. - Prior to this update, virt-who did not decode the hexadecimal representation of a password before decrypting it. As a consequence, the decrypted password did not match the original password, and attempts to connect using the password failed. virt-who has been updated to decode the encrypted password and, as a result, virt-who now handles storing credentials using encrypted passwords as expected. In addition, this update adds the following enhancement : - With this update, virt-who is able to read the list of guests from a remote libvirt hypervisor.
    last seen2020-03-18
    modified2015-03-26
    plugin id82261
    published2015-03-26
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/82261
    titleScientific Linux Security Update : virt-who on SL7.x (noarch) (20150305)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82261);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/25");
    
      script_cve_id("CVE-2014-0189");
    
      script_name(english:"Scientific Linux Security Update : virt-who on SL7.x (noarch) (20150305)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Scientific Linux host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that the /etc/sysconfig/virt-who configuration file,
    which may contain hypervisor authentication credentials, was world-
    readable. A local user could use this flaw to obtain authentication
    credentials from this file. (CVE-2014-0189)
    
    The virt-who package has been upgraded to upstream version 0.11, which
    provides a number of bug fixes and enhancements over the previous
    version. The most notable bug fixes and enhancements include :
    
      - Support for remote libvirt.
    
      - A fix for using encrypted passwords.
    
      - Bug fixes and enhancements that increase the stability
        of virt-who.
    
    This update also fixes the following bugs :
    
      - Prior to this update, the virt-who agent failed to read
        the list of virtual guests provided by the VDSM daemon.
        As a consequence, when in VDSM mode, the virt-who agent
        was not able to send updates about virtual guests to
        Subscription Asset Manager (SAM) and Satellite. With
        this update, the agent reads the list of guests when in
        VDSM mode correctly and reports to SAM and Satellite as
        expected.
    
      - Previously, virt-who used incorrect information when
        connecting to Satellite 5. Consequently, virt-who could
        not connect to Satellite 5 servers. The incorrect
        parameter has been corrected, and virt- who can now
        successfully connect to Satellite 5.
    
      - Prior to this update, virt-who did not decode the
        hexadecimal representation of a password before
        decrypting it. As a consequence, the decrypted password
        did not match the original password, and attempts to
        connect using the password failed. virt-who has been
        updated to decode the encrypted password and, as a
        result, virt-who now handles storing credentials using
        encrypted passwords as expected.
    
    In addition, this update adds the following enhancement :
    
      - With this update, virt-who is able to read the list of
        guests from a remote libvirt hypervisor."
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1503&L=scientific-linux-errata&T=0&P=2764
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?85739b60"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected virt-who package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:virt-who");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/26");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 7.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL7", reference:"virt-who-0.11-5.el7")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_NOTE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "virt-who");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0430.NASL
    descriptionAn updated virt-who package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The virt-who package provides an agent that collects information about virtual guests present in the system and reports them to the subscription manager. It was discovered that the /etc/sysconfig/virt-who configuration file, which may contain hypervisor authentication credentials, was world-readable. A local user could use this flaw to obtain authentication credentials from this file. (CVE-2014-0189) Red Hat would like to thank Sal Castiglione for reporting this issue. The virt-who package has been upgraded to upstream version 0.11, which provides a number of bug fixes and enhancements over the previous version. The most notable bug fixes and enhancements include : * Support for remote libvirt. * A fix for using encrypted passwords. * Bug fixes and enhancements that increase the stability of virt-who. (BZ#1122489) This update also fixes the following bugs : * Prior to this update, the virt-who agent failed to read the list of virtual guests provided by the VDSM daemon. As a consequence, when in VDSM mode, the virt-who agent was not able to send updates about virtual guests to Subscription Asset Manager (SAM) and Red Hat Satellite. With this update, the agent reads the list of guests when in VDSM mode correctly and reports to SAM and Satellite as expected. (BZ#1153405) * Previously, virt-who used incorrect information when connecting to Red Hat Satellite 5. Consequently, virt-who could not connect to Red Hat Satellite 5 servers. The incorrect parameter has been corrected, and virt-who can now successfully connect to Red Hat Satellite 5. (BZ#1158859) * Prior to this update, virt-who did not decode the hexadecimal representation of a password before decrypting it. As a consequence, the decrypted password did not match the original password, and attempts to connect using the password failed. virt-who has been updated to decode the encrypted password and, as a result, virt-who now handles storing credentials using encrypted passwords as expected. (BZ#1161607) In addition, this update adds the following enhancement : * With this update, virt-who is able to read the list of guests from a remote libvirt hypervisor. (BZ#1127965) Users of virt-who are advised to upgrade to this updated package, which corrects these issues and adds these enhancements.
    last seen2020-06-01
    modified2020-06-02
    plugin id81636
    published2015-03-05
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81636
    titleRHEL 7 : virt-who (RHSA-2015:0430)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-1632.NASL
    descriptionSecurity fix for CVE-2014-0189 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-02-16
    plugin id81352
    published2015-02-16
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81352
    titleFedora 21 : virt-who-0.8-11.fc21 (2015-1632)

Redhat

advisories
  • bugzilla
    id1124732
    title in the virt-who log
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • commentvirt-who is earlier than 0:0.9-6.el5
        ovaloval:com.redhat.rhba:tst:20141206001
      • commentvirt-who is signed with Red Hat redhatrelease key
        ovaloval:com.redhat.rhba:tst:20141206002
    rhsa
    idRHBA-2014:1206
    released2014-09-16
    severityNone
    titleRHBA-2014:1206: virt-who bug fix and enhancement update (None)
  • bugzilla
    id1139497
    titleFailed to run at vdsm mode when it has guest on host
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • commentvirt-who is earlier than 0:0.10-8.el6
        ovaloval:com.redhat.rhba:tst:20141513001
      • commentvirt-who is signed with Red Hat redhatrelease2 key
        ovaloval:com.redhat.rhba:tst:20141513002
    rhsa
    idRHBA-2014:1513
    released2014-10-13
    severityNone
    titleRHBA-2014:1513: virt-who bug fix and enhancement update (None)
  • bugzilla
    id1168122
    titlevirt-who incorrectly says that VM is from 'None' hypervisor
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • commentvirt-who is earlier than 0:0.11-5.el7
        ovaloval:com.redhat.rhsa:tst:20150430001
      • commentvirt-who is signed with Red Hat redhatrelease2 key
        ovaloval:com.redhat.rhba:tst:20141513002
    rhsa
    idRHSA-2015:0430
    released2015-03-05
    severityModerate
    titleRHSA-2015:0430: virt-who security, bug fix, and enhancement update (Moderate)
rpms
  • virt-who-0:0.9-6.el5
  • virt-who-0:0.10-8.el6
  • virt-who-0:0.11-5.el7