CVE-2013-4154

The qemuAgentCommand function in libvirt before 1.1.1, when a guest agent is not configured, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to "agent based cpu (un)plug," as demonstrated by the "virsh vcpucount foobar --guest" command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:54

Type Values Removed Values Added
References () http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=96518d4316b711c72205117f8d5c967d5127bbb6 - () http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=96518d4316b711c72205117f8d5c967d5127bbb6 -
References () http://libvirt.org/news.html - () http://libvirt.org/news.html -
References () http://openwall.com/lists/oss-security/2013/07/19/12 - Patch () http://openwall.com/lists/oss-security/2013/07/19/12 - Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=984821 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=984821 - Exploit
References () https://bugzilla.redhat.com/show_bug.cgi?id=986386 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=986386 - Patch

Information

Published : 2013-09-30 21:55

Updated : 2025-04-11 00:51


NVD link : CVE-2013-4154

Mitre link : CVE-2013-4154

CVE.ORG link : CVE-2013-4154


JSON object : View

Products Affected

redhat

  • libvirt