CVE-2012-4423

The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.
References
Link Resource
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=b7ff9e696063189a715802d081d55a398663c15a
http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=f8fbeb50d52520a109d71c8566fed2ea600650ec
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089976.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090121.html
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
http://rhn.redhat.com/errata/RHSA-2012-1359.html
http://www.openwall.com/lists/oss-security/2012/09/13/14
http://www.securityfocus.com/bid/55541
http://www.securitytracker.com/id?1027649
http://www.ubuntu.com/usn/USN-1708-1
https://bugzilla.redhat.com/show_bug.cgi?id=857133
https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=b7ff9e696063189a715802d081d55a398663c15a
http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=f8fbeb50d52520a109d71c8566fed2ea600650ec
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089976.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090121.html
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
http://rhn.redhat.com/errata/RHSA-2012-1359.html
http://www.openwall.com/lists/oss-security/2012/09/13/14
http://www.securityfocus.com/bid/55541
http://www.securitytracker.com/id?1027649
http://www.ubuntu.com/usn/USN-1708-1
https://bugzilla.redhat.com/show_bug.cgi?id=857133
https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-11-19 12:10

Updated : 2025-04-11 00:51


NVD link : CVE-2012-4423

Mitre link : CVE-2012-4423

CVE.ORG link : CVE-2012-4423


JSON object : View

Products Affected

redhat

  • libvirt