Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1441: Off-by-one Error

0
Medium
VulnerabilityCVE-2024-1441cvecve-2024-1441
Published: Mon Mar 11 2024 (03/11/2024, 13:37:54 UTC)
Source: CVE Database V5

Description

An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:28:49 UTC

Technical Analysis

CVE-2024-1441 is a medium-severity vulnerability identified in libvirt version 9.7.0, specifically within the udevListInterfacesByStatus() function. The issue is an off-by-one error that arises when the number of network interfaces exceeds the allocated size of the 'names' array used internally by this function. This boundary error can be triggered by an unprivileged client sending specially crafted data to the libvirt daemon, which manages virtualization capabilities on Linux systems. The flaw causes the daemon to crash, resulting in a denial of service condition. The vulnerability affects the availability of the libvirt service but does not compromise confidentiality or integrity. Exploitation requires local access with low privileges (AV:L/PR:L), no user interaction (UI:N), and the attack scope is unchanged (S:U). The CVSS 3.1 vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, reflecting that the attack is local, requires low privileges, and leads to high impact on availability. No known public exploits or patches are currently documented, but the issue has been officially published and reserved since February 2024. This vulnerability is particularly relevant for environments running libvirt 9.7.0 managing multiple network interfaces, such as cloud providers, virtualization hosts, and enterprise data centers.

Potential Impact

The primary impact of CVE-2024-1441 is a denial of service condition caused by crashing the libvirt daemon. This can disrupt virtualization management services, potentially affecting virtual machine lifecycle operations, network interface management, and overall system stability. Organizations relying on libvirt for virtualization orchestration may experience service outages or degraded performance, impacting business continuity and operational efficiency. Since the vulnerability requires local access with low privileges, attackers with limited system access could escalate their disruption capabilities. Although the vulnerability does not allow data leakage or unauthorized modification, the loss of availability can affect critical infrastructure, especially in cloud environments and data centers where libvirt is widely deployed. The absence of known exploits reduces immediate risk, but the medium severity and ease of triggering the crash warrant timely remediation to avoid potential exploitation in the future.

Mitigation Recommendations

To mitigate CVE-2024-1441, organizations should first verify if they are running libvirt version 9.7.0 or other affected versions. Applying official patches or updates from libvirt maintainers or Linux distribution vendors as soon as they become available is the most effective mitigation. In the absence of patches, administrators can limit local access to the libvirt daemon by enforcing strict access controls and user permissions, ensuring only trusted users can interact with libvirt. Monitoring logs for unusual or malformed requests to the libvirt daemon can help detect attempted exploitation. Additionally, reducing the number of network interfaces or configuring libvirt to handle interface enumeration more safely may reduce exposure. Employing system-level protections such as process resource limits and containerization can also help contain potential crashes. Regularly auditing virtualization hosts and applying security best practices for local user management will further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-02-12T11:47:40.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690eefde44af18c3752cf5d4

Added to database: 11/8/2025, 7:23:10 AM

Last enriched: 2/28/2026, 8:28:49 AM

Last updated: 3/25/2026, 9:31:26 PM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses