CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
89.6%
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | libvirt | * | cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:* |
redhat | libvirt | 0.0.1 | cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:* |
redhat | libvirt | 0.0.2 | cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:* |
redhat | libvirt | 0.0.3 | cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:* |
redhat | libvirt | 0.0.4 | cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:* |
redhat | libvirt | 0.0.5 | cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:* |
redhat | libvirt | 0.0.6 | cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:* |
redhat | libvirt | 0.1.0 | cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:* |
redhat | libvirt | 0.1.1 | cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:* |
redhat | libvirt | 0.1.3 | cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:* |
libvirt.org/news.html
lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html
lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
secunia.com/advisories/45375
secunia.com/advisories/45441
secunia.com/advisories/45446
www.debian.org/security/2011/dsa-2280
www.openwall.com/lists/oss-security/2011/06/28/9
www.redhat.com/support/errata/RHSA-2011-1019.html
www.redhat.com/support/errata/RHSA-2011-1197.html
www.securitytracker.com/id?1025822
www.ubuntu.com/usn/USN-1180-1
exchange.xforce.ibmcloud.com/vulnerabilities/68271
hermes.opensuse.org/messages/10027908
www.redhat.com/archives/libvir-list/2011-June/msg01278.html