Vulnerability Details : CVE-2013-0170
Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-0170
Probability of exploitation activity in the next 30 days: 1.83%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-0170
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-0170
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0170
-
http://rhn.redhat.com/errata/RHSA-2013-0199.html
RHSA-2013:0199 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720
libvirt.org Git
-
http://www.securityfocus.com/bid/57578
libvirt 'virNetMessageFree()' Function Use After Free Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
[SECURITY] Fedora 16 Update: libvirt-0.9.6.4-1.fc16Third Party Advisory
-
http://wiki.libvirt.org/page/Maintenance_Releases
Maintenance Releases - Libvirt WikiRelease Notes;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=893450
893450 – (CVE-2013-0170) CVE-2013-0170 libvirt: use-after-free in virNetMessageFree()Issue Tracking;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
[security-announce] openSUSE-SU-2013:0275-1: important: update for libviMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-1708-1
USN-1708-1: libvirt vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
[SECURITY] Fedora 17 Update: libvirt-0.9.11.9-1.fc17Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
[security-announce] openSUSE-SU-2013:0274-1: important: libvirt to fix uMailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
[SECURITY] Fedora 18 Update: libvirt-0.10.2.3-1.fc18Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/81552
libvirt virNetMessageFree() code execution CVE-2013-0170 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1028047
libvirt Use-After-Free May Let Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
http://libvirt.org/news.html
libvirt: ReleasesRelease Notes;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
[security-announce] SUSE-SU-2013:0320-1: important: Security update forMailing List;Third Party Advisory
Products affected by CVE-2013-0170
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*