CVE-2011-2511

Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
References
Link Resource
http://libvirt.org/news.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
http://secunia.com/advisories/45375 Vendor Advisory
http://secunia.com/advisories/45441 Vendor Advisory
http://secunia.com/advisories/45446 Vendor Advisory
http://www.debian.org/security/2011/dsa-2280
http://www.openwall.com/lists/oss-security/2011/06/28/9 Patch
http://www.redhat.com/support/errata/RHSA-2011-1019.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1197.html
http://www.securitytracker.com/id?1025822
http://www.ubuntu.com/usn/USN-1180-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/68271
https://hermes.opensuse.org/messages/10027908
https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html Patch
http://libvirt.org/news.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
http://secunia.com/advisories/45375 Vendor Advisory
http://secunia.com/advisories/45441 Vendor Advisory
http://secunia.com/advisories/45446 Vendor Advisory
http://www.debian.org/security/2011/dsa-2280
http://www.openwall.com/lists/oss-security/2011/06/28/9 Patch
http://www.redhat.com/support/errata/RHSA-2011-1019.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1197.html
http://www.securitytracker.com/id?1025822
http://www.ubuntu.com/usn/USN-1180-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/68271
https://hermes.opensuse.org/messages/10027908
https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://libvirt.org/news.html - () http://libvirt.org/news.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html -
References () http://secunia.com/advisories/45375 - Vendor Advisory () http://secunia.com/advisories/45375 - Vendor Advisory
References () http://secunia.com/advisories/45441 - Vendor Advisory () http://secunia.com/advisories/45441 - Vendor Advisory
References () http://secunia.com/advisories/45446 - Vendor Advisory () http://secunia.com/advisories/45446 - Vendor Advisory
References () http://www.debian.org/security/2011/dsa-2280 - () http://www.debian.org/security/2011/dsa-2280 -
References () http://www.openwall.com/lists/oss-security/2011/06/28/9 - Patch () http://www.openwall.com/lists/oss-security/2011/06/28/9 - Patch
References () http://www.redhat.com/support/errata/RHSA-2011-1019.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2011-1019.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1197.html - () http://www.redhat.com/support/errata/RHSA-2011-1197.html -
References () http://www.securitytracker.com/id?1025822 - () http://www.securitytracker.com/id?1025822 -
References () http://www.ubuntu.com/usn/USN-1180-1 - () http://www.ubuntu.com/usn/USN-1180-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68271 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/68271 -
References () https://hermes.opensuse.org/messages/10027908 - () https://hermes.opensuse.org/messages/10027908 -
References () https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html - Patch () https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html - Patch

Information

Published : 2011-08-10 20:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2511

Mitre link : CVE-2011-2511

CVE.ORG link : CVE-2011-2511


JSON object : View

Products Affected

redhat

  • libvirt
CWE
CWE-189

Numeric Errors