Executive Summary

Informations
Name CVE-2012-2652 First vendor Publication 2012-08-07
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.4 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18066
 
Oval ID: oval:org.mitre.oval:def:18066
Title: USN-1522-1 -- qemu-kvm vulnerability
Description: QEMU could be made to overwrite files as the administrator, or expose sensitive information.
Family: unix Class: patch
Reference(s): USN-1522-1
CVE-2012-2652
Version: 7
Platform(s): Ubuntu 12.04
Ubuntu 11.10
Ubuntu 11.04
Ubuntu 10.04
Product(s): qemu-kvm
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2012-10-22 Name : Gentoo Security Advisory GLSA 201210-04 (ebuild)
File : nvt/glsa_201210_04.nasl
2012-10-19 Name : Fedora Update for qemu FEDORA-2012-15606
File : nvt/gb_fedora_2012_15606_qemu_fc16.nasl
2012-10-16 Name : Fedora Update for qemu FEDORA-2012-15740
File : nvt/gb_fedora_2012_15740_qemu_fc17.nasl
2012-09-15 Name : Debian Security Advisory DSA 2542-1 (qemu-kvm)
File : nvt/deb_2542_1.nasl
2012-09-15 Name : Debian Security Advisory DSA 2545-1 (qemu)
File : nvt/deb_2545_1.nasl
2012-08-30 Name : Fedora Update for qemu FEDORA-2012-11302
File : nvt/gb_fedora_2012_11302_qemu_fc17.nasl
2012-08-14 Name : Fedora Update for qemu FEDORA-2012-11305
File : nvt/gb_fedora_2012_11305_qemu_fc16.nasl
2012-08-03 Name : Ubuntu Update for qemu-kvm USN-1522-1
File : nvt/gb_ubuntu_USN_1522_1.nasl

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-364.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-121.nasl - Type : ACT_GATHER_INFO
2012-10-19 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201210-04.nasl - Type : ACT_GATHER_INFO
2012-09-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2542.nasl - Type : ACT_GATHER_INFO
2012-09-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2545.nasl - Type : ACT_GATHER_INFO
2012-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2012-11302.nasl - Type : ACT_GATHER_INFO
2012-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2012-11305.nasl - Type : ACT_GATHER_INFO
2012-08-03 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1522-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/53725
DEBIAN http://www.debian.org/security/2012/dsa-2545
MISC http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commit%3Bh=eba25057b9a5e19...
http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
SECUNIA http://secunia.com/advisories/50132
http://secunia.com/advisories/50689
SUSE http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
UBUNTU http://www.ubuntu.com/usn/USN-1522-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Date Informations
2024-02-02 01:19:22
  • Multiple Updates
2024-02-01 12:05:43
  • Multiple Updates
2023-09-05 12:18:17
  • Multiple Updates
2023-09-05 01:05:36
  • Multiple Updates
2023-09-02 12:18:18
  • Multiple Updates
2023-09-02 01:05:41
  • Multiple Updates
2023-08-12 12:22:04
  • Multiple Updates
2023-08-12 01:05:42
  • Multiple Updates
2023-08-11 12:18:25
  • Multiple Updates
2023-08-11 01:05:52
  • Multiple Updates
2023-08-06 12:17:42
  • Multiple Updates
2023-08-06 01:05:43
  • Multiple Updates
2023-08-04 12:17:46
  • Multiple Updates
2023-08-04 01:05:46
  • Multiple Updates
2023-07-14 12:17:45
  • Multiple Updates
2023-07-14 01:05:40
  • Multiple Updates
2023-03-29 01:19:42
  • Multiple Updates
2023-03-28 12:05:48
  • Multiple Updates
2023-02-13 05:28:31
  • Multiple Updates
2022-10-11 12:15:51
  • Multiple Updates
2022-10-11 01:05:23
  • Multiple Updates
2021-05-04 12:19:59
  • Multiple Updates
2021-04-22 01:23:42
  • Multiple Updates
2020-05-23 00:33:41
  • Multiple Updates
2016-04-26 21:51:05
  • Multiple Updates
2014-06-14 13:32:56
  • Multiple Updates
2014-03-06 13:22:01
  • Multiple Updates
2014-02-17 11:10:34
  • Multiple Updates
2013-05-10 22:39:47
  • Multiple Updates
2013-04-19 13:20:43
  • Multiple Updates
2013-01-30 13:21:39
  • Multiple Updates
2012-12-21 13:20:23
  • Multiple Updates