First published: Sat Nov 02 2013(Updated: )
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SPICE | =0.12.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4282 has a high severity rating due to the potential for a remote denial of service attack.
To fix CVE-2013-4282, update to a patched version of SPICE or affected software as recommended by your vendor.
CVE-2013-4282 affects users of SPICE version 0.12.0 and certain Red Hat Enterprise Linux distributions.
CVE-2013-4282 is classified as a stack-based buffer overflow vulnerability.
Yes, CVE-2013-4282 can be exploited remotely by attackers sending a long password in a SPICE ticket.