qemu-kvm: privilege escalation
| Package(s): | qemu-kvm | CVE #(s): | CVE-2013-2231 | ||||||||||||||||||||||||||||
| Created: | July 23, 2013 | Updated: | July 26, 2013 | ||||||||||||||||||||||||||||
| Description: | From the Red Hat advisory:
An unquoted search path flaw was found in the way the QEMU Guest Agent service installation was performed on Windows. Depending on the permissions of the directories in the unquoted search path, a local, unprivileged user could use this flaw to have a binary of their choosing executed with SYSTEM privileges. | ||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||
