Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 May 2011 22:53:42 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: CVE request -- virt-v2v: vnc password protection is missing after
	vm conversion

Hello Steve, vendors.

Description:
It was found that after virtual machine conversion using virt-v2v the
target VM does not have VNC password enabled even though the source VM does.
An attacker able to connect to the target VM can possibly use this flaw to
operate the VM with privileges of the logged in user.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=702754
 
Could you please allocate a CVE identifier for this issue?

Thanks you,
--
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.