Max CVSS | 6.9 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2011-2511 | 4.0 |
Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
|
13-02-2023 - 04:31 | 10-08-2011 - 20:55 | |
CVE-2009-0036 | 4.4 |
Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the pack
|
13-02-2023 - 02:19 | 11-02-2009 - 20:30 | |
CVE-2011-1486 | 3.3 |
libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which allows remote attackers to cause a denial of service (crash) by causing multiple threads to report errors at the same time.
|
13-02-2023 - 01:19 | 31-05-2011 - 20:55 | |
CVE-2011-1146 | 6.9 |
libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettac
|
13-02-2023 - 01:19 | 15-03-2011 - 17:55 | |
CVE-2012-2693 | 3.7 |
libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to acces
|
15-01-2013 - 04:30 | 17-06-2012 - 03:41 | |
CVE-2010-2242 | 2.1 |
Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copyi
|
30-10-2010 - 05:41 | 19-08-2010 - 18:00 |