CVE-2013-0170
Summary
| CVE | CVE-2013-0170 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-02-08 20:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE-SU-2013:0320-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| libvirt: Wiki: Maintenance Releases | af854a3a-2127-422b-91ae-364da2661108 | wiki.libvirt.org | Release Notes, Vendor Advisory |
| [SECURITY] Fedora 16 Update: libvirt-0.9.6.4-1.fc16 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Third Party Advisory |
| Security Advisory SA52001 - Red Hat update for libvirt - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Third Party Advisory |
| osvdb.org/89644 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | Broken Link |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Third Party Advisory |
| [SECURITY] Fedora 18 Update: libvirt-0.10.2.3-1.fc18 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Third Party Advisory |
| USN-1708-1: libvirt vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2013:0274-1: important: libvirt to fix u | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Bug 893450 – CVE-2013-0170 libvirt: use-after-free in virNetMessageFree() | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | Third Party Advisory, VDB Entry |
| [SECURITY] Fedora 17 Update: libvirt-0.9.11.9-1.fc17 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Third Party Advisory |
| Security Advisory SA52003 - libvirt "virNetMessageFree()" Use-After-Free Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2013:0275-1: important: update for libvi | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| libvirt: Releases | af854a3a-2127-422b-91ae-364da2661108 | libvirt.org | Release Notes, Vendor Advisory |
| libvirt Use-After-Free May Let Remote Users Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| libvirt.org Git - libvirt.git/commit | af854a3a-2127-422b-91ae-364da2661108 | libvirt.org | |
| libvirt 'virNetMessageFree()' Function Use After Free Code Execution Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| libvirt.org Git - libvirt.git/commit | MITRE | libvirt.org | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| access.redhat.com | CVE-2013-0170 | MITRE | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 900035 CBL-Mariner Linux Security Update for libvirt 6.1.0