{"id":"CVE-2017-1000256","details":"libvirt version 2.3.0 and later is vulnerable to a bad default configuration of \"verify-peer=no\" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.","modified":"2026-04-16T06:17:36.237568470Z","published":"2017-10-31T15:29:00.240Z","related":["SUSE-SU-2017:2850-1","openSUSE-SU-2024:11008-1"],"references":[{"type":"WEB","url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-4003"},{"type":"REPORT","url":"https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000256"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvirt/libvirt","events":[{"introduced":"c3dfe808cf3dca9e27d407a6fbc9ba5f1b8ecbcb"},{"fixed":"6380fb9795cf921b96e1ad235a0cab78e318299d"},{"introduced":"0"},{"last_affected":"21b0099b79eccb5e89cea037db6d58480ae02553"}],"database_specific":{"versions":[{"introduced":"2.3.0"},{"fixed":"3.9.0"},{"introduced":"0"},{"last_affected":"9.0"}]}}],"versions":["CVE-2017-1000256","CVE-2017-2635","CVE-2018-1064","CVE-2018-5748","CVE-2018-6764","CVE-2019-10132","CVE-2019-10161","CVE-2019-10166","CVE-2019-10167","CVE-2019-10168","CVE-2019-3886","CVE-2020-14339","CVE-2020-25637","CVE-2021-3631","CVE-2021-3667","CVE-2022-0897","v2.3.0","v2.4.0","v2.4.0-rc1","v2.4.0-rc2","v2.5.0","v2.5.0-rc1","v2.5.0-rc2","v3.0.0","v3.0.0-rc1","v3.0.0-rc2","v3.1.0","v3.1.0-rc1","v3.1.0-rc2","v3.10.0","v3.10.0-rc1","v3.10.0-rc2","v3.2.0","v3.2.0-rc1","v3.2.0-rc2","v3.3.0","v3.3.0-rc1","v3.3.0-rc2","v3.4.0","v3.4.0-rc1","v3.4.0-rc2","v3.5.0","v3.5.0-rc1","v3.5.0-rc2","v3.6.0","v3.6.0-rc1","v3.6.0-rc2","v3.7.0","v3.7.0-rc1","v3.7.0-rc2","v3.8.0","v3.8.0-rc1","v3.9.0","v3.9.0-rc1","v3.9.0-rc2","v4.0.0","v4.0.0-rc1","v4.0.0-rc2","v4.1.0","v4.1.0-rc1","v4.1.0-rc2","v4.10.0","v4.10.0-rc1","v4.10.0-rc2","v4.2.0","v4.2.0-rc1","v4.2.0-rc2","v4.3.0","v4.3.0-rc1","v4.3.0-rc2","v4.4.0","v4.4.0-rc1","v4.4.0-rc2","v4.5.0","v4.5.0-rc1","v4.5.0-rc2","v4.6.0","v4.6.0-rc1","v4.6.0-rc2","v4.7.0","v4.7.0-rc1","v4.7.0-rc2","v4.8.0","v4.8.0-rc1","v4.8.0-rc2","v4.9.0","v4.9.0-rc1","v5.0.0","v5.0.0-rc1","v5.0.0-rc2","v5.1.0","v5.1.0-rc1","v5.1.0-rc2","v5.10.0","v5.10.0-rc1","v5.10.0-rc2","v5.2.0","v5.2.0-rc1","v5.2.0-rc2","v5.3.0","v5.3.0-rc1","v5.3.0-rc2","v5.4.0","v5.4.0-rc1","v5.4.0-rc2","v5.5.0","v5.5.0-rc1","v5.5.0-rc2","v5.6.0","v5.6.0-rc1","v5.6.0-rc2","v5.7.0","v5.7.0-rc1","v5.7.0-rc2","v5.8.0","v5.8.0-rc1","v5.8.0-rc2","v5.9.0","v5.9.0-rc1","v6.0.0","v6.0.0-rc1","v6.0.0-rc2","v6.1.0","v6.1.0-rc1","v6.1.0-rc2","v6.10.0","v6.10.0-rc1","v6.10.0-rc2","v6.2.0","v6.2.0-rc1","v6.3.0","v6.3.0-rc1","v6.4.0","v6.4.0-rc1","v6.5.0","v6.5.0-rc1","v6.5.0-rc2","v6.6.0","v6.6.0-rc1","v6.7.0","v6.7.0-rc1","v6.7.0-rc2","v6.8.0","v6.8.0-rc1","v6.8.0-rc2","v6.9.0","v6.9.0-rc1","v6.9.0-rc2","v7.0.0","v7.0.0-rc1","v7.0.0-rc2","v7.1.0","v7.1.0-rc1","v7.1.0-rc2","v7.10.0","v7.10.0-rc1","v7.10.0-rc2","v7.2.0","v7.2.0-rc1","v7.2.0-rc2","v7.3.0","v7.3.0-rc1","v7.3.0-rc2","v7.4.0","v7.4.0-rc1","v7.4.0-rc2","v7.5.0","v7.5.0-rc1","v7.5.0-rc2","v7.6.0","v7.6.0-rc1","v7.6.0-rc2","v7.7.0","v7.7.0-rc1","v7.7.0-rc2","v7.8.0","v7.8.0-rc1","v7.8.0-rc2","v7.9.0","v7.9.0-rc1","v7.9.0-rc2","v8.0.0","v8.0.0-rc1","v8.0.0-rc2","v8.1.0","v8.1.0-rc1","v8.1.0-rc2","v8.10.0","v8.10.0-rc1","v8.10.0-rc2","v8.2.0","v8.2.0-rc1","v8.2.0-rc2","v8.3.0","v8.3.0-rc1","v8.3.0-rc2","v8.4.0","v8.4.0-rc1","v8.4.0-rc2","v8.5.0","v8.5.0-rc1","v8.5.0-rc2","v8.6.0","v8.6.0-rc1","v8.6.0-rc2","v8.7.0","v8.7.0-rc1","v8.7.0-rc2","v8.8.0","v8.8.0-rc1","v8.8.0-rc2","v8.9.0","v8.9.0-rc1","v8.9.0-rc2","v9.0.0","v9.0.0-rc1","v9.0.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-1000256.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}