{"id":"CVE-2017-1000256","details":"libvirt version 2.3.0 and later is vulnerable to a bad default configuration of \"verify-peer=no\" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.","modified":"2026-05-18T05:48:50.969131133Z","published":"2017-10-31T15:29:00.240Z","related":["SUSE-SU-2017:2850-1","openSUSE-SU-2024:11008-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux","cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-4003"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000256"},{"type":"REPORT","url":"https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvirt/libvirt","events":[{"introduced":"c3dfe808cf3dca9e27d407a6fbc9ba5f1b8ecbcb"},{"fixed":"6380fb9795cf921b96e1ad235a0cab78e318299d"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"2.3.0"},{"fixed":"3.9.0"}],"cpe":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"}}],"versions":["v3.9.0-rc2","v3.9.0-rc1","CVE-2017-1000256","v3.7.0","v3.8.0","v3.8.0-rc1","v3.7.0-rc2","v3.7.0-rc1","v3.6.0","v3.6.0-rc2","v3.6.0-rc1","v3.5.0","v3.5.0-rc2","v3.5.0-rc1","v3.4.0","v3.4.0-rc2","v3.4.0-rc1","v3.3.0","v3.3.0-rc2","v3.3.0-rc1","v3.2.0","v3.2.0-rc2","v3.2.0-rc1","v3.1.0","v3.1.0-rc2","v3.1.0-rc1","CVE-2017-2635","v3.0.0","v3.0.0-rc2","v3.0.0-rc1","v2.5.0","v2.5.0-rc2","v2.5.0-rc1","v2.4.0","v2.4.0-rc2","v2.4.0-rc1","v2.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-1000256.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/libvirt/libvirt","events":[{"introduced":"c3dfe808cf3dca9e27d407a6fbc9ba5f1b8ecbcb"},{"fixed":"6380fb9795cf921b96e1ad235a0cab78e318299d"}],"database_specific":{"cpe":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"2.3.0"},{"fixed":"3.9.0"}],"source":"CPE_FIELD"}}],"versions":["v3.9.0-rc2","v3.9.0-rc1","CVE-2017-1000256","v3.7.0","v3.8.0","v3.8.0-rc1","v3.7.0-rc2","v3.7.0-rc1","v3.6.0","v3.6.0-rc2","v3.6.0-rc1","v3.5.0","v3.5.0-rc2","v3.5.0-rc1","v3.4.0","v3.4.0-rc2","v3.4.0-rc1","v3.3.0","v3.3.0-rc2","v3.3.0-rc1","v3.2.0","v3.2.0-rc2","v3.2.0-rc1","v3.1.0","v3.1.0-rc2","v3.1.0-rc1","CVE-2017-2635","v3.0.0","v3.0.0-rc2","v3.0.0-rc1","v2.5.0","v2.5.0-rc2","v2.5.0-rc1","v2.4.0","v2.4.0-rc2","v2.4.0-rc1","v2.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-1000256.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}