{
  "threat_severity" : "Moderate",
  "public_date" : "2013-05-06T00:00:00Z",
  "bugzilla" : {
    "description" : "qemu: guest agent creates files with insecure permissions in deamon mode",
    "id" : "956082",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=956082"
  },
  "cvss" : {
    "cvss_base_score" : "6.2",
    "cvss_scoring_vector" : "AV:L/AC:H/Au:N/C:C/I:C/A:C",
    "status" : "verified"
  },
  "details" : [ "The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files." ],
  "statement" : "This issue does not affect the kvm package as shipped with Red Hat Enterprise Linux 5.\nThis issue does not affect the xen package as shipped with Red Hat Enterprise Linux 5.\nThis issue does affect the qemu-kvm package as shipped with Red Hat Enterprise Linux 6. Future qemu-kvm updates in Red Hat Enterprise Linux 6 may address this flaw.\nPlease note that due to differences in upstream and Red Hat Enterprise Linux 6 versions of qemu guest agent this issue has lower security impact on systems running Red Hat Enterprise Linux 6.",
  "acknowledgement" : "This issue was discovered by Laszlo Ersek (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2013-06-03T00:00:00Z",
    "advisory" : "RHSA-2013:0896",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.355.el6_4.5"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "virtio-win",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "virtio-win",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 6.4",
    "fix_state" : "Affected",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.4"
  }, {
    "product_name" : "Red Hat OpenStack Platform 3",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/a:redhat:openstack:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-2007\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2007" ],
  "name" : "CVE-2013-2007",
  "csaw" : false
}