Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720 - | |
References | () http://libvirt.org/news.html - Release Notes, Vendor Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/89644 - Broken Link | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0199.html - Third Party Advisory | |
References | () http://secunia.com/advisories/52001 - Third Party Advisory | |
References | () http://secunia.com/advisories/52003 - Third Party Advisory | |
References | () http://wiki.libvirt.org/page/Maintenance_Releases - Release Notes, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/57578 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1028047 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1708-1 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=893450 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/81552 - Third Party Advisory, VDB Entry |
Information
Published : 2013-02-08 20:55
Updated : 2024-11-21 01:46
NVD link : CVE-2013-0170
Mitre link : CVE-2013-0170
CVE.ORG link : CVE-2013-0170
JSON object : View
Products Affected
opensuse
- opensuse
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- libvirt
- enterprise_linux_eus
- enterprise_linux_workstation
suse
- linux_enterprise_software_development_kit
- linux_enterprise_server
- linux_enterprise_desktop
canonical
- ubuntu_linux
fedoraproject
- fedora
CWE
CWE-416
Use After Free