CVE-2013-0170
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
08/02/2013
Last modified:
11/04/2025
Description
Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* | 0.9.6 (including) | 0.9.6.4 (excluding) |
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* | 0.9.11 (including) | 0.9.11.9 (excluding) |
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* | 0.10.2 (including) | 0.10.2.3 (excluding) |
cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* | 1.0.0 (including) | 1.0.2 (excluding) |
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* | ||
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://libvirt.org/git/?p=libvirt.git%3Ba%3Dcommit%3Bh%3D46532e3e8ed5f5a736a02f67d6c805492f9ca720
- http://libvirt.org/news.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
- http://osvdb.org/89644
- http://rhn.redhat.com/errata/RHSA-2013-0199.html
- http://secunia.com/advisories/52001
- http://secunia.com/advisories/52003
- http://wiki.libvirt.org/page/Maintenance_Releases
- http://www.securityfocus.com/bid/57578
- http://www.securitytracker.com/id/1028047
- http://www.ubuntu.com/usn/USN-1708-1
- https://bugzilla.redhat.com/show_bug.cgi?id=893450
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81552
- http://libvirt.org/git/?p=libvirt.git%3Ba%3Dcommit%3Bh%3D46532e3e8ed5f5a736a02f67d6c805492f9ca720
- http://libvirt.org/news.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
- http://osvdb.org/89644
- http://rhn.redhat.com/errata/RHSA-2013-0199.html
- http://secunia.com/advisories/52001
- http://secunia.com/advisories/52003
- http://wiki.libvirt.org/page/Maintenance_Releases
- http://www.securityfocus.com/bid/57578
- http://www.securitytracker.com/id/1028047
- http://www.ubuntu.com/usn/USN-1708-1
- https://bugzilla.redhat.com/show_bug.cgi?id=893450
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81552