Show plain JSON{"id": "CVE-2013-2211", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.4, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 4.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-08-28T21:55:08.560", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/55082", "source": "secalert@redhat.com"}, {"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", "source": "secalert@redhat.com"}, {"url": "http://www.debian.org/security/2014/dsa-3006", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2013/06/25/1", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2013/06/26/4", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/55082", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2014/dsa-3006", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2013/06/25/1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2013/06/26/4", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors."}, {"lang": "es", "value": "La biblioteca libxenlight (libxl) toolstack ein Xen 4.0.x, 4.1.x, y 4.2.x utiliza permisos d\u00e9biles para claves xenstore para dispositivos paravirtualizados y emulados de consola serie, lo que permite a administradores invitados (guest) la modificaci\u00f3n del valor xenstore a trav\u00e9s de vectores no especificados."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00"}, {"criteria": "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47640819-FC43-49ED-8A77-728C3D7255B3"}, {"criteria": "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2448537F-87AD-45C1-9FB0-7A49CA31BD76"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D532B60-C8DD-4A2F-9D05-E574D23EB754"}, {"criteria": "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D83CA8B-8E49-45FA-8FAB-C15052474542"}, {"criteria": "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27537DF5-7E0F-463F-BA87-46E329EE07AC"}, {"criteria": "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EA4F978-9145-4FE6-B4F9-15207E52C40A"}, {"criteria": "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22A995FD-9B7F-4DF0-BECF-4B086E470F1E"}, {"criteria": "cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "219597E2-E2D7-4647-8A7C-688B96300158"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "550223A9-B9F1-440A-8C25-9F0F76AF7301"}, {"criteria": "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC734D58-96E5-4DD2-8781-F8E0ADB96462"}, {"criteria": "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62CEC1BF-1922-410D-BCBA-C58199F574C7"}, {"criteria": "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "923F2C2B-4A65-4823-B511-D0FEB7C7FAB2"}, {"criteria": "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A24DED-B2EC-4D9C-9FA4-DD37EF3E3BFC"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}