#VU32531 Link following in libvirt - CVE-2013-6456


| Updated: 2020-07-28

Vulnerability identifier: #VU32531

Vulnerability risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2013-6456

CWE-ID: CWE-59

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
libvirt
Universal components / Libraries / Libraries used by multiple products

Vendor: libvirt.org

Description

The vulnerability allows a remote #AU# to damange or delete data.

The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.

Mitigation
Install update from vendor's website.

Vulnerable software versions

libvirt: 1.2.1


External links
https://libvirt.org/git/?p=libvirt.git;a=commit;h=5fc590ad9f4
https://libvirt.org/news.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-February/129199.html
https://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html
https://secunia.com/advisories/56187
https://secunia.com/advisories/56215
https://secunia.com/advisories/60895
https://security.gentoo.org/glsa/glsa-201412-04.xml
https://security.libvirt.org/2013/0018.html
https://www.securityfocus.com/bid/65743
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394
https://bugzilla.redhat.com/show_bug.cgi?id=1045643


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability