4.4

CVE-2011-1773

Exploit

virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password.

Data is provided by the National Vulnerability Database (NVD)
Matthew BoothVirt-v2v Version <= 0.8.3
Matthew BoothVirt-v2v Version0.1.0
Matthew BoothVirt-v2v Version0.2.0
Matthew BoothVirt-v2v Version0.3.0
Matthew BoothVirt-v2v Version0.3.2
Matthew BoothVirt-v2v Version0.4.0
Matthew BoothVirt-v2v Version0.4.9
Matthew BoothVirt-v2v Version0.4.10
Matthew BoothVirt-v2v Version0.5.0
Matthew BoothVirt-v2v Version0.5.1
Matthew BoothVirt-v2v Version0.5.2
Matthew BoothVirt-v2v Version0.5.3
Matthew BoothVirt-v2v Version0.5.4
Matthew BoothVirt-v2v Version0.6.0
Matthew BoothVirt-v2v Version0.6.1
Matthew BoothVirt-v2v Version0.6.2
Matthew BoothVirt-v2v Version0.6.3
Matthew BoothVirt-v2v Version0.7.0
Matthew BoothVirt-v2v Version0.7.1
Matthew BoothVirt-v2v Version0.8.0
Matthew BoothVirt-v2v Version0.8.1
Matthew BoothVirt-v2v Version0.8.2
RedhatEnterprise Linux Version6.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.07% 0.19
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P