CVE-2014-5177
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/08/2014
Last modified:
12/04/2025
Description
libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT from CVE-2014-0179 per ADT3 due to different affected versions of some vectors.
Impact
Base Score 2.0
1.20
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0003.html
- http://www.ubuntu.com/usn/USN-2366-1
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0003.html
- http://www.ubuntu.com/usn/USN-2366-1



