{"id":"USN-3576-1","summary":"libvirt vulnerabilities","details":"Vivian Zhang and Christoph Anton Mitterer discovered that libvirt\nincorrectly disabled password authentication when the VNC password was set\nto an empty string. A remote attacker could possibly use this issue to\nbypass authentication, contrary to expectations. This issue only affected\nUbuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-5008)\n\nDaniel P. Berrange discovered that libvirt incorrectly handled validating\nSSL/TLS certificates. A remote attacker could possibly use this issue to\nobtain sensitive information. This issue only affected Ubuntu 17.10.\n(CVE-2017-1000256)\n\nDaniel P. Berrange and Peter Krempa discovered that libvirt incorrectly\nhandled large QEMU replies. An attacker could possibly use this issue to\ncause libvirt to crash, resulting in a denial of service. (CVE-2018-5748)\n\nPedro Sampaio discovered that libvirt incorrectly handled the libnss_dns.so\nmodule. An attacker in a libvirt_lxc session could possibly use this issue\nto execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and\nUbuntu 17.10. (CVE-2018-6764)\n","modified":"2026-02-10T04:41:16Z","published":"2018-02-20T19:20:53Z","related":["UBUNTU-CVE-2016-5008","UBUNTU-CVE-2018-5748","UBUNTU-CVE-2018-6764"],"upstream":["CVE-2016-5008","CVE-2018-5748","CVE-2018-6764","UBUNTU-CVE-2016-5008","UBUNTU-CVE-2017-1000256","UBUNTU-CVE-2018-5748","UBUNTU-CVE-2018-6764"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3576-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5008"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5748"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6764"}],"affected":[{"package":{"name":"libvirt","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libvirt@1.2.2-0ubuntu13.1.26?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.2-0ubuntu13.1.26"}]}],"versions":["1.1.1-0ubuntu8","1.1.1-0ubuntu9","1.1.4-0ubuntu2","1.1.4-0ubuntu3","1.1.4-0ubuntu4","1.1.4-0ubuntu5","1.2.0-0ubuntu1","1.2.0-0ubuntu2","1.2.0-0ubuntu3","1.2.1-0ubuntu1","1.2.1-0ubuntu2","1.2.1-0ubuntu3","1.2.1-0ubuntu4","1.2.1-0ubuntu5","1.2.1-0ubuntu7","1.2.1-0ubuntu8","1.2.1-0ubuntu9","1.2.1-0ubuntu10","1.2.2-0ubuntu1","1.2.2-0ubuntu2","1.2.2-0ubuntu3","1.2.2-0ubuntu4","1.2.2-0ubuntu5","1.2.2-0ubuntu6","1.2.2-0ubuntu7","1.2.2-0ubuntu8","1.2.2-0ubuntu9","1.2.2-0ubuntu10","1.2.2-0ubuntu11","1.2.2-0ubuntu12","1.2.2-0ubuntu13","1.2.2-0ubuntu13.1","1.2.2-0ubuntu13.1.1","1.2.2-0ubuntu13.1.2","1.2.2-0ubuntu13.1.4","1.2.2-0ubuntu13.1.5","1.2.2-0ubuntu13.1.6","1.2.2-0ubuntu13.1.7","1.2.2-0ubuntu13.1.8","1.2.2-0ubuntu13.1.9","1.2.2-0ubuntu13.1.10","1.2.2-0ubuntu13.1.12","1.2.2-0ubuntu13.1.14","1.2.2-0ubuntu13.1.16","1.2.2-0ubuntu13.1.17","1.2.2-0ubuntu13.1.20","1.2.2-0ubuntu13.1.21","1.2.2-0ubuntu13.1.22","1.2.2-0ubuntu13.1.23","1.2.2-0ubuntu13.1.25"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.2.2-0ubuntu13.1.26","binary_name":"libvirt-bin"},{"binary_version":"1.2.2-0ubuntu13.1.26","binary_name":"libvirt-dev"},{"binary_version":"1.2.2-0ubuntu13.1.26","binary_name":"libvirt0"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3576-1.json","cves_map":{"cves":[{"id":"CVE-2016-5008","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5748","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"libvirt","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libvirt@1.3.1-1ubuntu10.19?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.1-1ubuntu10.19"}]}],"versions":["1.2.16-2ubuntu11","1.2.16-2ubuntu12","1.2.16-2ubuntu13","1.2.16-2ubuntu14","1.2.21-2ubuntu1","1.2.21-2ubuntu3","1.2.21-2ubuntu4","1.2.21-2ubuntu5","1.2.21-2ubuntu7","1.2.21-2ubuntu8","1.2.21-2ubuntu9","1.2.21-2ubuntu10","1.3.1-1ubuntu1","1.3.1-1ubuntu2","1.3.1-1ubuntu3","1.3.1-1ubuntu4","1.3.1-1ubuntu6","1.3.1-1ubuntu9","1.3.1-1ubuntu10","1.3.1-1ubuntu10.1","1.3.1-1ubuntu10.2","1.3.1-1ubuntu10.3","1.3.1-1ubuntu10.5","1.3.1-1ubuntu10.6","1.3.1-1ubuntu10.7","1.3.1-1ubuntu10.8","1.3.1-1ubuntu10.10","1.3.1-1ubuntu10.11","1.3.1-1ubuntu10.12","1.3.1-1ubuntu10.13","1.3.1-1ubuntu10.14","1.3.1-1ubuntu10.15","1.3.1-1ubuntu10.17","1.3.1-1ubuntu10.18"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.3.1-1ubuntu10.19","binary_name":"libvirt-bin"},{"binary_version":"1.3.1-1ubuntu10.19","binary_name":"libvirt-dev"},{"binary_version":"1.3.1-1ubuntu10.19","binary_name":"libvirt0"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3576-1.json","cves_map":{"cves":[{"id":"CVE-2016-5008","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5748","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-6764","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}