Vulnerability Description
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Libvirt | >= 2.3.0, < 3.9.0 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-4003Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2017-1000256Issue TrackingVendor Advisory
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html
- https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.htmlIssue TrackingVendor Advisory
- http://www.debian.org/security/2017/dsa-4003Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2017-1000256Issue TrackingVendor Advisory
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html
- https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.htmlIssue TrackingVendor Advisory
FAQ
What is CVE-2017-1000256?
CVE-2017-1000256 is a vulnerability with a CVSS score of 8.1 (HIGH). libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
How severe is CVE-2017-1000256?
CVE-2017-1000256 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000256?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Libvirt, Debian Debian Linux.