First published: Wed Jan 09 2013(Updated: )
A flaw was found in the way message freeing on connection cleanup was handled under certain error conditions. A remote user able to issue commands to libvirt daemon could use this flaw to crash libvirtd or, potentially, escalate their privilages to that of libvirtd process. Acknowledgements: This issue was discovered by Tingting Zheng of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libvirt | >=0.9.6<0.9.6.4 | |
Red Hat Libvirt | >=0.9.11<0.9.11.9 | |
Red Hat Libvirt | >=0.10.2<0.10.2.3 | |
Red Hat Libvirt | >=1.0.0<1.0.2 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Fedora | =16 | |
Fedora | =17 | |
Fedora | =18 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.3 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0170 has a severity level that indicates it may allow remote users to crash the libvirtd service or potentially escalate privileges.
Versions of Red Hat Libvirt prior to 0.9.6.4, between 0.9.6 and 0.9.11.9, between 0.10.2 and 1.0.2, as well as several versions of openSUSE and Fedora are affected.
To fix CVE-2013-0170, users should upgrade to the latest version of the affected software that addresses the vulnerability.
Yes, CVE-2013-0170 can be exploited remotely by users who can issue commands to the libvirt daemon.
CVE-2013-0170 can potentially lead to denial-of-service conditions or privilege escalation, compromising system security.