Vulnerabilities > Redhat > Enterprise Virtualization > Medium

DATE CVE VULNERABILITY TITLE RISK
2019-11-13 CVE-2014-8167 Improper Certificate Validation vulnerability in Redhat products
vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack
network
redhat CWE-295
4.3
2018-06-20 CVE-2018-1117 ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log.
network
low complexity
ovirt redhat
5.0
2018-04-26 CVE-2018-1074 Insufficiently Protected Credentials vulnerability in multiple products
ovirt-engine API and administration web portal before versions 4.2.2.5, 4.1.11.2 is vulnerable to an exposure of Power Management credentials, including cleartext passwords to Host Administrators.
network
low complexity
ovirt redhat CWE-522
4.0
2017-04-20 CVE-2016-6338 Improper Access Control vulnerability in Redhat Enterprise Virtualization 4.0
ovirt-engine-webadmin, as used in Red Hat Enterprise Virtualization Manager (aka RHEV-M) for Servers and RHEV-M 4.0, allows physically proximate attackers to bypass a webadmin session timeout restriction via vectors related to UI selections, which trigger repeating queries.
low complexity
redhat CWE-284
6.8
2016-12-14 CVE-2016-4443 Information Exposure Through Log Files vulnerability in Redhat Enterprise Virtualization 3.6
Red Hat Enterprise Virtualization (RHEV) Manager 3.6 allows local users to obtain encryption keys, certificates, and other sensitive information by reading the engine-setup log file.
local
low complexity
redhat CWE-532
5.5
2014-02-10 CVE-2012-3406 Permissions, Privileges, and Access Controls vulnerability in multiple products
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
6.8
2014-02-10 CVE-2012-3405 Numeric Errors vulnerability in multiple products
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.
network
low complexity
gnu redhat canonical CWE-189
5.0
2014-02-10 CVE-2012-3404 Numeric Errors vulnerability in multiple products
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
network
low complexity
gnu redhat canonical CWE-189
5.0
2010-08-24 CVE-2010-2811 Denial of Service vulnerability in Redhat Enterprise Virtualization 2.2
Virtual Desktop Server Manager (VDSM) in Red Hat Enterprise Virtualization (RHEV) 2.2 does not properly accept TCP connections for SSL sessions, which allows remote attackers to cause a denial of service (daemon outage) via crafted SSL traffic.
5.7
2010-08-24 CVE-2010-2784 Permissions, Privileges, and Access Controls vulnerability in Redhat Enterprise Virtualization and KVM
The subpage MMIO initialization functionality in the subpage_register function in exec.c in QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly select the index for access to the callback array, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors.
local
redhat CWE-264
6.6