{"id":"CVE-2012-3445","details":"The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.","modified":"2026-04-10T03:43:12.417476Z","published":"2012-08-07T21:55:02Z","related":["openSUSE-SU-2024:10209-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1202.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50118"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50299"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=844734"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/07/31/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/07/31/7"},{"type":"WEB","url":"http://www.securityfocus.com/bid/54748"},{"type":"WEB","url":"https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html"}],"schema_version":"1.7.5"}