Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10873

Опубликовано: 16 авг. 2018
Источник: redhat
CVSS3: 8.3
EPSS Низкий

Описание

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.

A vulnerability was discovered in SPICE where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5qspiceNot affected
Red Hat Enterprise Linux 8spiceNot affected
Red Hat Enterprise Linux 6spice-gtkFixedRHSA-2018:273220.09.2018
Red Hat Enterprise Linux 6spice-serverFixedRHSA-2018:273220.09.2018
Red Hat Enterprise Linux 7spiceFixedRHSA-2018:273120.09.2018
Red Hat Enterprise Linux 7spice-gtkFixedRHSA-2018:273120.09.2018
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7imgbasedFixedRHSA-2018:347005.11.2018
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7redhat-release-virtualization-hostFixedRHSA-2018:347005.11.2018
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7redhat-virtualization-hostFixedRHSA-2018:347005.11.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1596008spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service

EPSS

Процентиль: 79%
0.0127
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
ubuntu
около 7 лет назад

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.

CVSS3: 8.3
nvd
около 7 лет назад

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.

CVSS3: 8.3
debian
около 7 лет назад

A vulnerability was discovered in SPICE before version 0.14.1 where th ...

CVSS3: 8.8
github
больше 3 лет назад

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.

oracle-oval
около 7 лет назад

ELSA-2018-2732: spice-gtk and spice-server security update (IMPORTANT)

EPSS

Процентиль: 79%
0.0127
Низкий

8.3 High

CVSS3