CVE-2013-6436
Published Jan 7, 2014
Last updated 2 years ago
Overview
- Description
- The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67B77F63-C9AC-42D4-B9E2-4BBE196AC254" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3256288E-5A49-4DCD-AE30-6B4E21AEF970" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25E764AE-3B7C-4378-97C5-10E835511684" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49FEFFA5-371E-4B1D-AAAE-C71AEB79A4AF" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F982F65C-CBF9-4EE6-8FD6-C965141E42C9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4BF8152-79A4-48C6-88EB-9D3FA7466844" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E4DCDE-4D85-4339-99CB-70A464FA2EE9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E03AF346-6F4E-4BEA-B29E-9C9C04148843" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54FAE380-0E7E-4468-A07B-5A9A3504F681" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB4B1021-4D01-4D86-AED4-0418F8839FD6" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "380686BB-7212-4285-BA00-B8EEAC6E1CC9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A331072-326A-4E72-84E2-E0424E6DDE30" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB1666DD-AC49-477A-921C-8197F5EFECA6" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "527B9236-CA4E-42A8-8C7A-2FB92BE2B4B9" } ], "operator": "OR" } ] } ]