First published: Tue Jul 31 2012(Updated: )
It has been found that sending crafted RPC command with nparams set to 0 can lead to libvirtd accessing random memory, possibly leading to crash. A remote attacker could use this flaw to crash libvirtd (DoS). Upstream proposed fix: <a href="https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html">https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Libvirt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-844734 is classified as a denial of service (DoS) vulnerability.
To fix REDHAT-BUG-844734, apply the relevant patches or updates provided by Red Hat for libvirt.
The vulnerability REDHAT-BUG-844734 affects users of Red Hat libvirt.
REDHAT-BUG-844734 can be exploited by a remote attacker sending crafted RPC commands to crash the libvirtd service.
Exploiting REDHAT-BUG-844734 can lead to the libvirtd service accessing random memory, resulting in a crash.