Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-5748 CVE-2018-6764 |
CWE-ID | CWE-400 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Fedora Operating systems & Components / Operating system libvirt Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU11465
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5748
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to a flaw in qemu/qemu_monitor.c in libvirt. A remote attacker can supply a large QEMU reply, trigger resource exhaustion and cause the service to crash.
Install updates from vendor's repository.
Vulnerable software versionsFedora: 27
libvirt: before 3.7.0-4.fc27
CPE2.3 External linkshttps://bodhi.fedoraproject.org/updates/FEDORA-2018-b22d46eabb
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10793
Risk: Low
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-6764
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to bypass security restrictions on the target system.
The weakness exists in the util/virlog.c source code file due to improper determination of hostnames during LXC container startup. An adjacent attacker can bypass security restrictions and execute arbitrary commands.
Install updates from vendor's repository.
Vulnerable software versionsFedora: 27
libvirt: before 3.7.0-4.fc27
CPE2.3 External linkshttps://bodhi.fedoraproject.org/updates/FEDORA-2018-b22d46eabb
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.