First published: Mon Aug 02 2010(Updated: )
There is a race in spice-activex when a local attacker is able to create a named pipe with the expected name that is used for parameter passing (password, cert file) between spice-activex and spice client. Also ImpersonateNamedPipeClient() function that allows server to impersonate security context of connected user could be used to gain privileges of the spice user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Virtualization Manager | <=2.2.3 | |
Redhat Enterprise Virtualization Manager | =2.2 | |
Redhat Enterprise Virtualization Manager | =2.1 | |
Redhat Spice-activex |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.