CVE-2011-2511

Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
References
Link Resource
http://libvirt.org/news.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
http://secunia.com/advisories/45375 Vendor Advisory
http://secunia.com/advisories/45441 Vendor Advisory
http://secunia.com/advisories/45446 Vendor Advisory
http://www.debian.org/security/2011/dsa-2280
http://www.openwall.com/lists/oss-security/2011/06/28/9 Patch
http://www.redhat.com/support/errata/RHSA-2011-1019.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1197.html
http://www.securitytracker.com/id?1025822
http://www.ubuntu.com/usn/USN-1180-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/68271
https://hermes.opensuse.org/messages/10027908
https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html Patch
http://libvirt.org/news.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062515.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062855.html
http://secunia.com/advisories/45375 Vendor Advisory
http://secunia.com/advisories/45441 Vendor Advisory
http://secunia.com/advisories/45446 Vendor Advisory
http://www.debian.org/security/2011/dsa-2280
http://www.openwall.com/lists/oss-security/2011/06/28/9 Patch
http://www.redhat.com/support/errata/RHSA-2011-1019.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1197.html
http://www.securitytracker.com/id?1025822
http://www.ubuntu.com/usn/USN-1180-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/68271
https://hermes.opensuse.org/messages/10027908
https://www.redhat.com/archives/libvir-list/2011-June/msg01278.html Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-08-10 20:55

Updated : 2025-04-11 00:51


NVD link : CVE-2011-2511

Mitre link : CVE-2011-2511

CVE.ORG link : CVE-2011-2511


JSON object : View

Products Affected

redhat

  • libvirt
CWE
CWE-189

Numeric Errors