First published: Tue Jul 31 2012(Updated: )
It has been found that sending crafted RPC command with nparams set to 0 can lead to libvirtd accessing random memory, possibly leading to crash. A remote attacker could use this flaw to crash libvirtd (DoS). Upstream proposed fix: <a href="https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html">https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | =0.9.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3445 has a severity rating that indicates it can lead to a denial of service (DoS) due to potential crashing of libvirtd.
To fix CVE-2012-3445, upgrade to a patched version of libvirt that addresses this vulnerability.
CVE-2012-3445 affects Red Hat Libvirt version 0.9.13.
Yes, CVE-2012-3445 can be exploited by a remote attacker to crash the libvirtd service.
The exploitation of CVE-2012-3445 can lead to a denial of service, causing libvirtd to become unavailable.