Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Red Hat Enterprise Virtualization Vendors:   Red Hat
Red Hat Enterprise Virtualization Manager Lets Local Users Obtain Passwords and Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1028076
SecurityTracker URL:
CVE Reference:   CVE-2012-6115, CVE-2013-0168   (Links to External Site)
Date:  Feb 5 2013
Impact:   Denial of service via network, Disclosure of authentication information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.1
Description:   Two vulnerabilities were reported in Red Hat Enterprise Virtualization Manager. A local user can obtain passwords. A remote authenticated user can cause denial of service conditions.

When the domain management tool is run with the validate action ('rhevm-manage-domains -action=validate'), the system logs administrative passwords to a world-readable log file [CVE-2012-6115]. A local user can obtain passwords and then gain control of target systems that are managed by the Red Hat Enterprise Virtualization Manager.

Andrew Cathrow of Red Hat reported this vulnerability.

A remote authenticated user with sufficient privileges (e.g., storage admin user of a storage domain) can exploit a permission checking flaw in the MoveDisk command to consume all available free space in a different storage domain that they do not have permissions for [CVE-2013-0168].

Ondrej Machacek of Red Hat reported this vulnerability.

Impact:   A remote authenticated user can consume excessive disk space on the target system.

A local user can obtain passwords.

Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   None.

 Source Message Contents

Subject:  [RHSA-2013:0211-01] Moderate: rhevm 3.1.2 security and bug fix update

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Moderate: rhevm 3.1.2 security and bug fix update
Advisory ID:       RHSA-2013:0211-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:
Issue date:        2013-02-04
CVE Names:         CVE-2012-6115 CVE-2013-0168 

1. Summary:

Updated rhevm packages that fix two security issues and various bugs are
now available.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEV-M 3.1 - noarch

3. Description:

The Red Hat Enterprise Virtualization Manager is a centralized management
platform that allows system administrators to view and manage virtual
machines. The Red Hat Enterprise Virtualization Manager provides a
comprehensive range of features including search capabilities, resource
management, live migrations, and virtual infrastructure provisioning. The
Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a User Portal, and a
Representational State Transfer (REST) Application Programming Interface

It was discovered that running the domain management tool with the validate
action ("rhevm-manage-domains -action=validate") logged administrative
passwords to a world-readable log file. A local attacker could use this
flaw to gain control of systems that are managed by Red Hat Enterprise
Virtualization Manager. (CVE-2012-6115)

A flaw was found in the way the MoveDisk command checked permissions on the
target storage domain. A privileged user (a storage admin of a storage
domain) could use this flaw to exhaust all available free space in another
storage domain they would otherwise not have access to. (CVE-2013-0168)

The CVE-2012-6115 issue was discovered by Andrew Cathrow of Red Hat. The
CVE-2013-0168 issue was discovered by Ondrej Machacek of Red Hat.

Previously, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to
3.1 was not formally supported by Red Hat. This update fixes a number of
known issues with the upgrade process. As a result, upgrading from Red Hat
Enterprise Virtualization Manager 3.0 to 3.1 is now supported.

For more information on upgrading to Red Hat Enterprise Virtualization
Manager 3.1, consult the Installation Guide:

Additional tips and considerations to take into account are also available
in the Red Hat Knowledgebase:

Information on the bugs fixed in this update is available in the Technical
Notes document:

All Red Hat Enterprise Virtualization Manager administrators are advised to
install these updated packages, which fix these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

5. Bugs fixed (

842134 - [Storage] cannot force extend block storage domains (no force extendVG support)
854214 - engine: logging - when domain is partially inaccessible event log does not report which luns are inaccessible
881059 - RESTAPI: RSDL does not document lun-based disks parameters for add()
881121 - [es_ES] heading "Virtual size" is truncated in Spanish [LAYOUT]
881783 - ovrit-engine-backend:.rollbackQuota ignores disabled quota
883893 - [ja_JP] Test case failure: Host Tab [LAYOUT] - "no network assigned" translation doesn't fit a single line
883896 - [ja_JP] Test case failure: Storage Tab: General sub-tab: unnecessary colon (":") between "Used: xxxxGB" line and NFS Export Path
883903 - [es_ES] Event Tab, Advance view 's heading Event is truncated [LAYOUT]
883910 - [ja_JP] Test case failure: Disk Tab: Remove Disk(s) dialog: "[disk-alias] is Bootable and Attached to [n] VM(s)" message structure need to be revised.
883915 - Portal Login button label is not localized
883933 - [zh_CN] Truncation column name on logical networks sub tab [LAYOUT]
886166 - Backend: CPU pinning works only with single-digit CPU's
886520 - Create ISCSI LUN Disk: Connection details should be mandatory
886654 - [ja_JP] Test case failure: Check the message for Alert/Events/Tasks: The Date part of the message contains minutes in the month-section.
887856 - [ja_JP] Test case failure: Virtual Machines [LAYOUT]: New VM dialog -> Resrouce Allocation section -> string "clone" is broken into two lines
887904 - [rhevm-upgrade] during upgrade rhev-guest-tools-iso is not updated to latest version and remains with old version
888039 - Failed Hot-Plug and Hot-UnPlug Direct LUN in FC DC environment
888309 - Importing a VM from an OVF without the diskAlias property with copyCollapse=false will not auto-generate disk aliases
888317 - [engine] [upgrade] Unable to perform operations as user on existing VM after upgrade from RHEV 3.0 to 3.1
888785 - [RHEVM Web Admin Portal localization] Zanata source strings (rhevm-3.1 version) containing "oVirt" and "Engine"
889792 - 'Configure Local Disk' does not work properly in Japanese environment
891631 - rhevm-upgrade must check for enough disk space to perform an upgrade before starting the upgrade
893355 - CVE-2013-0168 rhev-m: insufficient MoveDisk target domain permission checks
902341 - [User Portal] An user with UserRole assigned to a pool does not see pool's VMs
905865 - CVE-2012-6115 rhev: rhevm-manage-domains logs admin passwords

6. Package List:

RHEV-M 3.1:



These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from

7. References:

8. Contact:

The Red Hat security contact is <>.  More contact
details at

Copyright 2013 Red Hat, Inc.
Version: GnuPG v1.4.4 (GNU/Linux)


RHSA-announce mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC