{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2861","assignerOrgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","state":"PUBLISHED","assignerShortName":"fedora","dateReserved":"2023-05-24T07:54:12.009Z","datePublished":"2023-12-06T06:19:40.625Z","dateUpdated":"2024-08-02T06:33:05.791Z"},"containers":{"cna":{"title":"Qemu: 9pfs: improper access control on special files","metrics":[{"other":{"content":{"value":"Low","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder."}],"affected":[{"versions":[{"status":"unaffected","version":"8.1.0-rc0","lessThan":"*","versionType":"semver"}],"packageName":"qemu","collectionURL":"https://gitlab.com/qemu-project/qemu","defaultStatus":"affected"}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-2861","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219266","name":"RHBZ#2219266","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html"},{"url":"https://security.netapp.com/advisory/ntap-20240125-0005/"},{"url":"https://security.netapp.com/advisory/ntap-20240229-0002/"}],"datePublic":"2023-06-07T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-284","description":"Improper Access Control","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-284: Improper Access Control","timeline":[{"lang":"en","time":"2023-05-16T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-06-07T00:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Jietao Xiao, Jinku Li, Wenbo Shen, and Yanwu Shen for reporting this issue."}],"providerMetadata":{"orgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","shortName":"fedora","dateUpdated":"2024-04-19T13:40:08.248Z"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-2861","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-01-24T16:40:48.930612Z"}}}],"affected":[{"cpes":["cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*"],"vendor":"qemu","product":"qemu","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"8.1.0"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:16:52.155Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:33:05.791Z"},"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-2861","tags":["vdb-entry","x_refsource_REDHAT","x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219266","name":"RHBZ#2219266","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240125-0005/","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240229-0002/","tags":["x_transferred"]}]}]}}