Vulnerability identifier: #VU42523
Vulnerability risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2013-2218
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
libvirt
Universal components / Libraries /
Libraries used by multiple products
Vendor: libvirt.org
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.
Mitigation
Install update from vendor's website.
Vulnerable software versions
libvirt: 1.0.6
External links
https://libvirt.org/git/?p=libvirt.git;a=commit;h=244e0b8cf15ca2ef48d82058e728656e6c4bad11
https://libvirt.org/news.html
https://www.openwall.com/lists/oss-security/2013/07/01/6
https://bugzilla.redhat.com/show_bug.cgi?id=980112
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.