Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2013-2007 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
qemu (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU32665
Risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2013-2007
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
MitigationInstall update from vendor's website.
Vulnerable software versionsqemu (Alpine package): 0.15.1-r0
CPE2.3 External linkshttps://git.alpinelinux.org/aports/commit/?id=8cedb270f0092677dc5f897a4632323d12c81787
https://git.alpinelinux.org/aports/commit/?id=ef7cc55e6635a229f49ae024c7b4f92945b1aa2d
https://git.alpinelinux.org/aports/commit/?id=563e2f3d73036c1b799204edd5a7742c90ee711d
https://git.alpinelinux.org/aports/commit/?id=0a719315035072323f00ba0aadcf16849598923f
https://git.alpinelinux.org/aports/commit/?id=3fe8d5a2ee5d338106f55639b69337377618e91b
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.