Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-4423

Опубликовано: 24 июл. 2012
Источник: redhat
CVSS2: 3.3
EPSS Низкий

Описание

The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.

Отчет

The versions of libvirt as shipped with Red Hat Enterprise Linux 5 are not affected. This issue did affect the versions of the libvirt package as shipped with Red Hat Enterprise Linux 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libvirtNot affected
Red Hat Enterprise Linux 6libvirtFixedRHSA-2012:135911.10.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=857133libvirt: null function pointer invocation in virNetServerProgramDispatchCall()

EPSS

Процентиль: 86%
0.0287
Низкий

3.3 Low

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.

nvd
почти 13 лет назад

The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.

debian
почти 13 лет назад

The virNetServerProgramDispatchCall function in libvirt before 0.10.2 ...

github
больше 3 лет назад

The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.

oracle-oval
почти 13 лет назад

ELSA-2012-1359: libvirt security and bug fix update (MODERATE)

EPSS

Процентиль: 86%
0.0287
Низкий

3.3 Low

CVSS2