CVE-2013-1922
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
13/05/2013
Last modified:
11/04/2025
Description
qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
Impact
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103621.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103637.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104036.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.openwall.com/lists/oss-security/2013/04/15/3
- http://www.openwall.com/lists/oss-security/2013/04/16/2
- http://www.securitytracker.com/id/1028426
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103621.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103637.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104036.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.openwall.com/lists/oss-security/2013/04/15/3
- http://www.openwall.com/lists/oss-security/2013/04/16/2
- http://www.securitytracker.com/id/1028426



