CVE-2013-7336
Published May 7, 2014
Last updated a year ago
Overview
- Description
- The qemuMigrationWaitForSpice function in qemu/qemu_migration.c in libvirt before 1.1.3 does not properly enter a monitor when performing seamless SPICE migration, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) by causing domblkstat to be called at the same time as the qemuMonitorGetSpiceMigrationStatus function.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 1.9
- Impact score
- 2.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- <a href="http://cwe.mitre.org/data/definitions/476.html">CWE-476: NULL Pointer Dereference</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBE8EDAF-8A1C-4D86-A3C2-9A9F8CA99105", "versionEndIncluding": "1.1.2" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E13A6AAE-BC1B-4CE1-B747-84F9C6B3FF73" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DDA1805-ED8A-44AA-96FF-E676D278CCFD" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBD82EEA-279F-42CA-8F4C-A4D57EEBAB0D" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "320C2182-DBCF-4564-940A-D12673C73543" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB635DBE-29F1-4055-A064-42539FC811C4" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67B77F63-C9AC-42D4-B9E2-4BBE196AC254" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3256288E-5A49-4DCD-AE30-6B4E21AEF970" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25E764AE-3B7C-4378-97C5-10E835511684" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49FEFFA5-371E-4B1D-AAAE-C71AEB79A4AF" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F982F65C-CBF9-4EE6-8FD6-C965141E42C9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4BF8152-79A4-48C6-88EB-9D3FA7466844" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E4DCDE-4D85-4339-99CB-70A464FA2EE9" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E03AF346-6F4E-4BEA-B29E-9C9C04148843" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54FAE380-0E7E-4468-A07B-5A9A3504F681" }, { "criteria": "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB4B1021-4D01-4D86-AED4-0418F8839FD6" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" } ], "operator": "OR" } ] } ]