6.8
CVSSv2

CVE-2013-0170

Published: 08/02/2013 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x prior to 1.0.2, 0.10.2 prior to 0.10.2.3, 0.9.11 prior to 0.9.11.9, and 0.9.6 prior to 0.9.6.4 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat libvirt

suse linux enterprise desktop 11

opensuse opensuse 12.2

opensuse opensuse 12.1

suse linux enterprise software development kit 11

suse linux enterprise server 11

fedoraproject fedora 17

fedoraproject fedora 16

fedoraproject fedora 18

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux eus 6.3

canonical ubuntu linux 12.10

canonical ubuntu linux 12.04

Vendor Advisories

Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic Updated libvirt packages that fix one security issue are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerabilit ...
libvirt could be made to crash or run programs if it received specially crafted network traffic ...
Debian Bug report logs - #699224 libvirt [CVE-2013-0170]: libvirt Use-After-Free May Let Remote Users Execute Arbitrary Code Package: libvirt; Maintainer for libvirt is Debian Libvirt Maintainers <pkg-libvirt-maintainers@listsaliothdebianorg>; Reported by: Luciano Bello <luciano@debianorg> Date: Tue, 29 Jan 2013 0 ...
Debian Bug report logs - #701649 libvirt-bin - libvirtd changes permissions of devices to libvirt-qemu:kvm (CVE-2013-1766) Package: libvirt-bin; Maintainer for libvirt-bin is Debian Libvirt Maintainers <pkg-libvirt-maintainers@listsaliothdebianorg>; Source for libvirt-bin is src:libvirt (PTS, buildd, popcon) Reported by: ...

Github Repositories

Experimental compiler modifications to protect function pointers against overwrites through memory corruption vulnerabilities

fp-protect Function pointer protection is an experimental compiler modification for the C compiler of GCC with the intention to protect function pointers against malicious overwrites through memory corruption vulnerabilities The approach should be fully compliant with the C99 standard However, in some cases of implementation defined behaviour, the protection scheme will break