VYPR
Unrated severityNVD Advisory· Published Aug 3, 2014· Updated May 6, 2026

CVE-2014-0179

CVE-2014-0179

Description

libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.

Affected products

75
  • cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
  • Red Hat/Libvirt71 versions
    cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*+ 70 more
    • cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.