[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3596-1 spice -- spice

ID: oval:org.secpod.oval:def:602528Date: (C)2016-06-09   (M)2023-12-20
Class: PATCHFamily: unix




Several vulnerabilities were discovered in spice, a SPICE protocol client and server library. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-0749 Jing Zhao of Red Hat discovered a memory allocation flaw, leading to a heap-based buffer overflow in spice"s smartcard interaction. A user connecting to a guest VM via spice can take advantage of this flaw to cause a denial-of-service , or potentially to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2016-2150 Frediano Ziglio of Red Hat discovered that a malicious guest inside a virtual machine can take control of the corresponding QEMU process in the host using crafted primary surface parameters.

Platform:
Debian 8.x
Product:
spice-client
Reference:
DSA-3596-1
CVE-2016-0749
CVE-2016-2150
CVE    2
CVE-2016-0749
CVE-2016-2150
CPE    2
cpe:/a:spice_project:spice-client
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies