6.9
CVSSv2

CVE-2011-1146

Published: 15/03/2011 Updated: 13/02/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote malicious users to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat libvirt 0.8.8

Vendor Advisories

Debian Bug report logs - #617773 libvirt: several API calls do not honour read-only connection Package: libvirt; Maintainer for libvirt is Debian Libvirt Maintainers <pkg-libvirt-maintainers@listsaliothdebianorg>; Reported by: Luciano Bello <luciano@debianorg> Date: Fri, 11 Mar 2011 09:51:01 UTC Severity: normal ...
An attacker could send crafted input to libvirt and cause it to crash ...
It was discovered that libvirt, a library for interfacing with different virtualization systems, did not properly check for read-only connections This allowed a local attacker to perform a denial of service (crash) or possibly escalate privileges The oldstable distribution (lenny) is not affected by this problem For the stable distribution (sque ...