ID CVE-2013-2231
Summary Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux 6.0
    cpe:2.3:o:redhat:enterprise_linux:6.0
  • Red Hat Enterprise Linux Desktop Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0
  • Red Hat Enterprise Linux Server Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0
  • Red Hat Enterprise Linux Server Supplementary 6.4 (v. 6.4)
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.4
  • Red Hat Enterprise Linux Server Supplementary 6.4.z (v. 6.4.z)
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.4.z
  • Red Hat Enterprise Linux Workstation Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0
  • Microsoft Windows
    cpe:2.3:o:microsoft:windows
CVSS
Base: 7.2 (as of 02-10-2013 - 11:31)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130722_QEMU_KVM_ON_SL6_X.NASL
    description An unquoted search path flaw was found in the way the QEMU Guest Agent service installation was performed on Windows. Depending on the permissions of the directories in the unquoted search path, a local, unprivileged user could use this flaw to have a binary of their choosing executed with SYSTEM privileges. (CVE-2013-2231) After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 69013
    published 2013-07-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69013
    title Scientific Linux Security Update : qemu-kvm on SL6.x i386/srpm/x86_64
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-1101.NASL
    description An updated virtio-win package that fixes one security issue is now available for Red Hat Enterprise Linux 6 Supplementary. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. An unquoted search path flaw was found in the way the QEMU Guest Agent service installation was performed on Windows. Depending on the permissions of the directories in the unquoted search path, a local, unprivileged user could use this flaw to have a binary of their choosing executed with SYSTEM privileges. (CVE-2013-2231) This issue was discovered by Lev Veyde of Red Hat. Users of virtio-win are advised to upgrade to this updated package, which corrects this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 69012
    published 2013-07-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69012
    title RHEL 6 : virtio-win (RHSA-2013:1101)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-1100.NASL
    description Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. An unquoted search path flaw was found in the way the QEMU Guest Agent service installation was performed on Windows. Depending on the permissions of the directories in the unquoted search path, a local, unprivileged user could use this flaw to have a binary of their choosing executed with SYSTEM privileges. (CVE-2013-2231) This issue was discovered by Lev Veyde of Red Hat. All users of qemu-kvm should upgrade to these updated packages, which contain backported patches to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 69011
    published 2013-07-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69011
    title RHEL 6 : qemu-kvm (RHSA-2013:1100)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-1100.NASL
    description From Red Hat Security Advisory 2013:1100 : Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. An unquoted search path flaw was found in the way the QEMU Guest Agent service installation was performed on Windows. Depending on the permissions of the directories in the unquoted search path, a local, unprivileged user could use this flaw to have a binary of their choosing executed with SYSTEM privileges. (CVE-2013-2231) This issue was discovered by Lev Veyde of Red Hat. All users of qemu-kvm should upgrade to these updated packages, which contain backported patches to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
    last seen 2019-02-21
    modified 2015-12-01
    plugin id 69010
    published 2013-07-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69010
    title Oracle Linux 6 : qemu-kvm (ELSA-2013-1100)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-1100.NASL
    description Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. An unquoted search path flaw was found in the way the QEMU Guest Agent service installation was performed on Windows. Depending on the permissions of the directories in the unquoted search path, a local, unprivileged user could use this flaw to have a binary of their choosing executed with SYSTEM privileges. (CVE-2013-2231) This issue was discovered by Lev Veyde of Red Hat. All users of qemu-kvm should upgrade to these updated packages, which contain backported patches to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 69022
    published 2013-07-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69022
    title CentOS 6 : qemu-kvm (CESA-2013:1100)
redhat via4
advisories
  • bugzilla
    id 980757
    title CVE-2013-2231 qemu: qemu-ga win32 service unquoted search path
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment qemu-guest-agent is earlier than 2:0.12.1.2-2.355.el6_4.6
          oval oval:com.redhat.rhsa:tst:20131100011
        • comment qemu-guest-agent is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121234008
      • AND
        • comment qemu-guest-agent-win32 is earlier than 2:0.12.1.2-2.355.el6_4.6
          oval oval:com.redhat.rhsa:tst:20131100013
        • comment qemu-guest-agent-win32 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130609014
      • AND
        • comment qemu-img is earlier than 2:0.12.1.2-2.355.el6_4.6
          oval oval:com.redhat.rhsa:tst:20131100007
        • comment qemu-img is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110345008
      • AND
        • comment qemu-kvm is earlier than 2:0.12.1.2-2.355.el6_4.6
          oval oval:com.redhat.rhsa:tst:20131100005
        • comment qemu-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110345006
      • AND
        • comment qemu-kvm-tools is earlier than 2:0.12.1.2-2.355.el6_4.6
          oval oval:com.redhat.rhsa:tst:20131100009
        • comment qemu-kvm-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110345010
    rhsa
    id RHSA-2013:1100
    released 2013-07-22
    severity Important
    title RHSA-2013:1100: qemu-kvm security update (Important)
  • rhsa
    id RHSA-2013:1101
rpms
  • qemu-guest-agent-2:0.12.1.2-2.355.el6_4.6
  • qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.6
  • qemu-img-2:0.12.1.2-2.355.el6_4.6
  • qemu-kvm-2:0.12.1.2-2.355.el6_4.6
  • qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.6
refmap via4
misc https://bugzilla.redhat.com/show_bug.cgi?id=980757
Last major update 07-10-2013 - 10:11
Published 01-10-2013 - 13:55
Last modified 22-04-2019 - 13:48
Back to Top