#VU42523 Resource management error in libvirt - CVE-2013-2218


| Updated: 2020-08-11

Vulnerability identifier: #VU42523

Vulnerability risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2013-2218

CWE-ID: CWE-399

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
libvirt
Universal components / Libraries / Libraries used by multiple products

Vendor: libvirt.org

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.

Mitigation
Install update from vendor's website.

Vulnerable software versions

libvirt: 1.0.6


External links
https://libvirt.org/git/?p=libvirt.git;a=commit;h=244e0b8cf15ca2ef48d82058e728656e6c4bad11
https://libvirt.org/news.html
https://www.openwall.com/lists/oss-security/2013/07/01/6
https://bugzilla.redhat.com/show_bug.cgi?id=980112


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability