Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
https://exchange.xforce.ibmcloud.com/vulnerabilities/81552
https://bugzilla.redhat.com/show_bug.cgi?id=893450
http://www.ubuntu.com/usn/USN-1708-1
http://www.securitytracker.com/id/1028047
http://www.securityfocus.com/bid/57578
http://wiki.libvirt.org/page/Maintenance_Releases
http://secunia.com/advisories/52003
http://secunia.com/advisories/52001
http://rhn.redhat.com/errata/RHSA-2013-0199.html
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720