Vulnerabilities > Redhat > Enterprise Virtualization

DATE CVE VULNERABILITY TITLE RISK
2016-10-03 CVE-2016-5432 Information Exposure Through Log Files vulnerability in Redhat Enterprise Virtualization 4.0
The ovirt-engine-provisiondb utility in Red Hat Enterprise Virtualization (RHEV) Engine 4.0 allows local users to obtain sensitive database provisioning information by reading log files.
local
low complexity
redhat CWE-532
3.3
2015-09-08 CVE-2015-1841 Code vulnerability in Redhat Enterprise Virtualization 3.0
The Web Admin interface in Red Hat Enterprise Virtualization Manager (RHEV-M) allows local users to bypass the timeout function by selecting a VM in the VM grid view.
local
high complexity
redhat CWE-17
3.7
2014-08-03 CVE-2014-5177 Improper Input Validation vulnerability in multiple products
libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.
local
high complexity
redhat opensuse CWE-20
1.2
2014-02-10 CVE-2012-3406 Permissions, Privileges, and Access Controls vulnerability in multiple products
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
6.8
2014-02-10 CVE-2012-3405 Numeric Errors vulnerability in multiple products
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.
network
low complexity
gnu redhat canonical CWE-189
5.0
2014-02-10 CVE-2012-3404 Numeric Errors vulnerability in multiple products
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
network
low complexity
gnu redhat canonical CWE-189
5.0
2014-01-21 CVE-2013-2152 Local Privilege Escalation vulnerability in Redhat Enterprise Virtualization 3.2
Unquoted Windows search path vulnerability in the SPICE service, as used in Red Hat Enterprise Virtualization (RHEV) 3.2, allows local users to gain privileges via a crafted application in an unspecified folder.
local
low complexity
redhat
7.2
2013-08-28 CVE-2013-2176 Resource Management Errors vulnerability in Redhat Enterprise Virtualization 3.0/3.2
Unquoted Windows search path vulnerability in the Red Hat Enterprise Virtualization Application Provisioning Tool (RHEV-APT) in the rhev-guest-tools-iso package 3.2 allows local users to gain privileges via a Trojan horse application.
local
low complexity
redhat CWE-399
7.2
2013-08-19 CVE-2013-0167 Denial of Service vulnerability in Red Hat Enterprise Virtualization Hypervisor
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."
low complexity
redhat
2.7
2013-01-31 CVE-2013-1591 Integer Overflow or Wraparound vulnerability in multiple products
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors.
network
low complexity
redhat palemoon CWE-190
critical
9.8