EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631) - Nessus
Medium Plugin ID: 147481This page contains detailed information about the EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631) Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.
Plugin Overview
ID: 147481
Name: EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631)
Filename: EulerOS_SA-2021-1631.nasl
Vulnerability Published: N/A
This Plugin Published: 2021-03-10
Last Modification Time: 2021-04-20
Plugin Version: 1.3
Plugin Type: local
Plugin Family: Huawei Local Security Checks
Dependencies:
ssh_get_info.nasl
Required KB Items [?]: Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/uvp_version, Host/local_checks_enabled
Vulnerability Information
Severity: Medium
Vulnerability Published: N/A
Patch Published: 2021-03-10
CVE [?]: CVE-2020-12430, CVE-2020-14301, CVE-2020-14339, CVE-2020-25637
CPE [?]: cpe:/o:huawei:euleros:uvp:2.9.1, p-cpe:/a:huawei:euleros:libvirt, p-cpe:/a:huawei:euleros:libvirt-admin, p-cpe:/a:huawei:euleros:libvirt-client, p-cpe:/a:huawei:euleros:libvirt-daemon, p-cpe:/a:huawei:euleros:libvirt-daemon-config-network, p-cpe:/a:huawei:euleros:libvirt-daemon-config-nwfilter, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-interface, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-network, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nodedev, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nwfilter, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-qemu, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-secret, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-core, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-disk, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-logical, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-mpath, p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-scsi, p-cpe:/a:huawei:euleros:libvirt-daemon-kvm, p-cpe:/a:huawei:euleros:libvirt-devel, p-cpe:/a:huawei:euleros:libvirt-docs, p-cpe:/a:huawei:euleros:libvirt-libs
Synopsis
The remote EulerOS Virtualization host is missing multiple security updates.
Description
According to the versions of the libvirt packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :
- A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-25637)
- A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-14339)
- An issue was discovered in qemuDomainGetStatsIOThread in qemu/qemu_driver.c in libvirt 4.10.0 though 6.x before 6.1.0. A memory leak was found in the virDomainListGetStats libvirt API that is responsible for retrieving domain statistics when managing QEMU guests. This flaw allows unprivileged users with a read-only connection to cause a memory leak in the domstats command, resulting in a potential denial of service.(CVE-2020-12430)
- An information disclosure vulnerability was found in libvirt. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the `dumpxml` command.(CVE-2020-14301)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libvirt packages.
Public Exploits
Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (GitHub)
Exploit Ease: Exploits (PoCs) are available
Here's the list of publicly known exploits and PoCs for verifying the EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631) vulnerability:
- GitHub: https://github.com/brahmiboudjema/CVE-2020-25637-libvirt-double-free
[CVE-2020-25637: Double Free]
Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.
WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.
Risk Information
CVSS Score Source [?]: CVE-2020-25637
CVSS V2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
CVSS Base Score: | 7.2 (High) |
Impact Subscore: | 10.0 |
Exploitability Subscore: | 3.9 |
CVSS Temporal Score: | 5.3 (Medium) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 5.3 (Medium) |
CVSS Base Score: | 6.7 (Medium) |
Impact Subscore: | 5.9 |
Exploitability Subscore: | 0.8 |
CVSS Temporal Score: | 5.8 (Medium) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 5.8 (Medium) |
Go back to menu.
Plugin Source
This is the EulerOS_SA-2021-1631.nasl nessus plugin source code. This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(147481);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/04/20");
script_cve_id(
"CVE-2020-12430",
"CVE-2020-14301",
"CVE-2020-14339",
"CVE-2020-25637"
);
script_name(english:"EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631)");
script_summary(english:"Checks the rpm output for the updated packages.");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the libvirt packages installed, the
EulerOS Virtualization installation on the remote host is affected by
the following vulnerabilities :
- A double free memory issue was found to occur in the
libvirt API, in versions before 6.8.0, responsible for
requesting information about network interfaces of a
running QEMU domain. This flaw affects the polkit
access control driver. Specifically, clients connecting
to the read-write socket with limited ACL permissions
could use this flaw to crash the libvirt daemon,
resulting in a denial of service, or potentially
escalate their privileges on the system. The highest
threat from this vulnerability is to data
confidentiality and integrity as well as system
availability.(CVE-2020-25637)
- A flaw was found in libvirt, where it leaked a file
descriptor for `/dev/mapper/control` into the QEMU
process. This file descriptor allows for privileged
operations to happen against the device-mapper on the
host. This flaw allows a malicious guest user or
process to perform operations outside of their standard
permissions, potentially causing serious damage to the
host operating system. The highest threat from this
vulnerability is to confidentiality, integrity, as well
as system availability.(CVE-2020-14339)
- An issue was discovered in qemuDomainGetStatsIOThread
in qemu/qemu_driver.c in libvirt 4.10.0 though 6.x
before 6.1.0. A memory leak was found in the
virDomainListGetStats libvirt API that is responsible
for retrieving domain statistics when managing QEMU
guests. This flaw allows unprivileged users with a
read-only connection to cause a memory leak in the
domstats command, resulting in a potential denial of
service.(CVE-2020-12430)
- An information disclosure vulnerability was found in
libvirt. HTTP cookies used to access network-based
disks were saved in the XML dump of the guest domain.
This flaw allows an attacker to access potentially
sensitive information in the domain configuration via
the `dumpxml` command.(CVE-2020-14301)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1631
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0ec98516");
script_set_attribute(attribute:"solution", value:
"Update the affected libvirt packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-25637");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"patch_publication_date", value:"2021/03/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/03/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-admin");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-config-network");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-config-nwfilter");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-interface");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-network");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nodedev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-nwfilter");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-qemu");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-secret");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-core");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-disk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-iscsi");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-logical");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-mpath");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-driver-storage-scsi");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-daemon-kvm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-docs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvirt-libs");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:2.9.1");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "2.9.1") audit(AUDIT_OS_NOT, "EulerOS Virtualization 2.9.1");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["libvirt-6.2.0-2.9.1.2.197",
"libvirt-6.2.0-2.9.1.2.197.src",
"libvirt-admin-6.2.0-2.9.1.2.197",
"libvirt-client-6.2.0-2.9.1.2.197",
"libvirt-daemon-6.2.0-2.9.1.2.197",
"libvirt-daemon-config-network-6.2.0-2.9.1.2.197",
"libvirt-daemon-config-nwfilter-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-interface-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-network-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-nodedev-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-nwfilter-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-qemu-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-secret-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-core-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-disk-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-iscsi-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-logical-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-mpath-6.2.0-2.9.1.2.197",
"libvirt-daemon-driver-storage-scsi-6.2.0-2.9.1.2.197",
"libvirt-daemon-kvm-6.2.0-2.9.1.2.197",
"libvirt-devel-6.2.0-2.9.1.2.197",
"libvirt-docs-6.2.0-2.9.1.2.197",
"libvirt-libs-6.2.0-2.9.1.2.197"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvirt");
}
The latest version of this script can be found in these locations depending on your platform:
- Linux / Unix:
/opt/nessus/lib/nessus/plugins/EulerOS_SA-2021-1631.nasl
- Windows:
C:\ProgramData\Tenable\Nessus\nessus\plugins\EulerOS_SA-2021-1631.nasl
- Mac OS X:
/Library/Nessus/run/lib/nessus/plugins/EulerOS_SA-2021-1631.nasl
Go back to menu.
How to Run
Here is how to run the EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631) as a standalone plugin via the Nessus web user interface (https://localhost:8834/):
- Click to start a New Scan.
- Select Advanced Scan.
- Navigate to the Plugins tab.
- On the top right corner click to Disable All plugins.
- On the left side table select Huawei Local Security Checks plugin family.
- On the right side table select EulerOS Virtualization 2.9.1 : libvirt (EulerOS-SA-2021-1631) plugin ID 147481.
- Specify the target on the Settings tab and click to Save the scan.
- Run the scan.
Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.
Basic usage:
/opt/nessus/bin/nasl EulerOS_SA-2021-1631.nasl -t <IP/HOST>
Run the plugin with audit trail message on the console:
/opt/nessus/bin/nasl -a EulerOS_SA-2021-1631.nasl -t <IP/HOST>
Run the plugin with trace script execution written to the console (useful for debugging):
/opt/nessus/bin/nasl -T - EulerOS_SA-2021-1631.nasl -t <IP/HOST>
Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):
/opt/nessus/bin/nasl -K /tmp/state EulerOS_SA-2021-1631.nasl -t <IP/HOST>
Go back to menu.
References
See also:
- https://www.tenable.com/plugins/nessus/147481
- http://www.nessus.org/u?0ec98516
- https://vulners.com/nessus/EULEROS_SA-2021-1631.NASL
- 143577 - Amazon Linux 2 : libvirt (ALAS-2020-1569)
- 157696 - AlmaLinux 8 : virt:rhel and virt-devel:rhel (ALSA-2021:1762)
- 149772 - CentOS 8 : virt:rhel and virt-devel:rhel (CESA-2021:1762)
- 143055 - CentOS 7 : libvirt (CESA-2020:5040)
- 141137 - Debian DLA-2395-1 : libvirt security update
- 144728 - EulerOS Virtualization for ARM 64 3.0.2.0 : libvirt (EulerOS-SA-2021-1045)
- 147562 - EulerOS Virtualization 3.0.6.6 : libvirt (EulerOS-SA-2021-1456)
- 147104 - EulerOS Virtualization for ARM 64 3.0.6.0 : libvirt (EulerOS-SA-2021-1526)
- 147678 - EulerOS Virtualization 2.9.0 : libvirt (EulerOS-SA-2021-1666)
- 142183 - openSUSE Security Update : libvirt (openSUSE-2020-1777)
- 142188 - openSUSE Security Update : libvirt (openSUSE-2020-1778)
- 142784 - Oracle Linux 7 : libvirt (ELSA-2020-5040)
- 146198 - Oracle Linux 7 : libvirt (ELSA-2020-5961)
- 155325 - Oracle Linux 8 : virt:ol / and / virt-devel:rhel (ELSA-2021-1762)
- 142700 - RHEL 7 : libvirt (RHSA-2020:5040)
- 142982 - RHEL 8 : virt:8.2 and virt-devel:8.2 (RHSA-2020:5111)
- 149669 - RHEL 8 : virt:rhel and virt-devel:rhel (RHSA-2021:1762)
- 142821 - Scientific Linux Security Update : libvirt on SL7.x i686/x86_64 (2020:5040)
- 143850 - SUSE SLES15 Security Update : libvirt (SUSE-SU-2020:2969-1)
- 143884 - SUSE SLED15 / SLES15 Security Update : libvirt (SUSE-SU-2020:2970-1)
- 143649 - SUSE SLED15 / SLES15 Security Update : libvirt (SUSE-SU-2020:3037-1)
- 143827 - SUSE SLES12 Security Update : libvirt (SUSE-SU-2020:3038-1)
- 143759 - SUSE SLES12 Security Update : libvirt (SUSE-SU-2020:3039-1)
- 143635 - SUSE SLES12 Security Update : libvirt (SUSE-SU-2020:3095-1)
- 143851 - SUSE SLES12 Security Update : libvirt (SUSE-SU-2020:3143-1)
- 160444 - Ubuntu 18.04 LTS / 20.04 LTS / 21.10 : libvirt vulnerabilities (USN-5399-1)
Version
This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file EulerOS_SA-2021-1631.nasl version 1.3. For more plugins, visit the Nessus Plugin Library.
Go back to menu.