CVE-2020-14339
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: Low Impact
- Attack Vector: LOCAL
- Privileges Required: Low Impact
- Scope: CHANGED
- User Interaction: NONE
CIA Impact Definition
- Confidentiality: HIGH IMPACT
- Integrity: HIGH IMPACT
- Availability: HIGH IMPACT
CVE-2020-14339 Vulnerability Summary
A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Access Complexity Graph for CVE-2020-14339
Impact Analysis for CVE-2020-14339
CVE-2020-14339: Detailed Information and External References
EPSS
0.00044
EPSS %
0.15085
References
0.00044
- https://bugzilla.redhat.com/show_bug.cgi?id=1860069
- https://security.gentoo.org/glsa/202101-22
- https://security.gentoo.org/glsa/202210-06
CWE
CWE-772
CAPEC
0.00044
- HTTP DoS: An attacker performs flooding at the HTTP level to bring down only a particular web application rather than anything listening on a TCP/IP connection. This denial of service attack requires substantially fewer packets to be sent which makes DoS harder to detect. This is an equivalent of SYN flood in HTTP. The idea is to keep the HTTP session alive indefinitely and then repeat that hundreds of times. This attack targets resource depletion weaknesses in web server software. The web server will wait to attacker's responses on the initiated HTTP sessions while the connection threads are being exhausted.
Vulnerable Configurations
-
cpe:2.3:a:redhat:libvirt:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.2.0:*:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.2.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.2.0:-:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.2.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.3.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.3.0:-:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.3.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.4.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.4.0:-:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.4.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.5.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.5.0:-:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.5.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.5.0:rc2:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.6.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.6.0:-:*:*:*:*:*:*
-
cpe:2.3:a:redhat:libvirt:6.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:6.6.0:rc1:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
CVSS3 Source
nvd@nist.gov
CVSS3 Type
Primary
CVSS3 Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.