Filtered by vendor Ovirt
Subscribe
Total
33 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-15113 | 2 Ovirt, Redhat | 2 Ovirt, Virtualization | 2024-11-21 | 3.5 LOW | 7.2 HIGH |
ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues. | |||||
CVE-2016-6341 | 1 Ovirt | 1 Ovirt | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
oVirt Engine before 4.0.3 does not include DWH_DB_PASSWORD in the list of keys to hide in log files, which allows local users to obtain sensitive password information by reading engine log files. | |||||
CVE-2014-8170 | 2 Ovirt, Redhat | 2 Ovirt-node, Enterprise Virtualization | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
ovirt_safe_delete_config in ovirtfunctions.py and other unspecified locations in ovirt-node 3.0.0-474-gb852fd7 as packaged in Red Hat Enterprise Virtualization 3 do not properly quote input strings, which allows remote authenticated users and physically proximate attackers to execute arbitrary commands via a ; (semicolon) in an input string. | |||||
CVE-2014-7851 | 2 Ovirt, Redhat | 2 Ovirt, Ovirt-engine | 2024-11-21 | 6.0 MEDIUM | 7.5 HIGH |
oVirt 3.2.2 through 3.5.0 does not invalidate the restapi session after logout from the webadmin, which allows remote authenticated users with knowledge of another user's session data to gain that user's privileges by replacing their session token with that of another user. | |||||
CVE-2014-0154 | 1 Ovirt | 1 Ovirt | 2024-11-21 | 5.0 MEDIUM | N/A |
oVirt Engine before 3.5.0 does not include the HTTPOnly flag in a Set-Cookie header for the session IDs, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | |||||
CVE-2014-0153 | 1 Ovirt | 1 Ovirt | 2024-11-21 | 4.3 MEDIUM | N/A |
The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page. | |||||
CVE-2014-0152 | 2 Ovirt, Redhat | 2 Ovirt, Ovirt-engine | 2024-11-21 | 6.8 MEDIUM | N/A |
Session fixation vulnerability in the web admin interface in oVirt 3.4.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors. | |||||
CVE-2013-4367 | 2 Linux, Ovirt | 2 Linux Kernel, Ovirt-engine | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
ovirt-engine 3.2 running on Linux kernel 3.1 and newer creates certain files world-writeable due to an upstream kernel change which impacted how python's os.chmod() works when passed a mode of '-1'. | |||||
CVE-2013-0293 | 1 Ovirt | 1 Node | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
oVirt Node: Lock screen accepts F2 to drop to shell causing privilege escalation | |||||
CVE-2012-5638 | 1 Ovirt | 1 Sanlock | 2024-11-21 | 3.6 LOW | N/A |
The setup_logging function in log.h in SANLock uses world-writable permissions for /var/log/sanlock.log, which allows local users to overwrite the file content or bypass intended disk-quota restrictions via standard filesystem write operations. | |||||
CVE-2012-5518 | 1 Ovirt | 1 Vdsm | 2024-11-21 | 4.3 MEDIUM | 7.5 HIGH |
vdsm: certificate generation upon node creation allowing vdsm to start and serve requests from anyone who has a matching key (and certificate) | |||||
CVE-2012-4480 | 2 Fedoraproject, Ovirt | 2 Fedora, Mom | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
mom creates world-writable pid files in /var/run | |||||
CVE-2012-3533 | 2 Ovirt, Ovirt-engine-sdk | 3 Ovirt, Ovirt-engine-cli, 3.1.0.5 | 2024-11-21 | 5.0 MEDIUM | N/A |
The python SDK before 3.1.0.6 and CLI before 3.1.0.8 for oVirt 3.1 does not check the server SSL certificate against the client keys, which allows remote attackers to spoof a server via a man-in-the-middle (MITM) attack. |