First published: Tue Sep 08 2015(Updated: )
Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SPICE | =0.12.4 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3247 has a severity rating that can lead to denial of service and potential arbitrary code execution.
To fix CVE-2015-3247, it is recommended to update to a non-vulnerable version of SPICE.
CVE-2015-3247 is caused by a race condition in the worker_update_monitors_config function in SPICE.
Remote authenticated guest users on SPICE version 0.12.4 may exploit CVE-2015-3247.
CVE-2015-3247 can be exploited to cause heap-based memory corruption and crashes in QEMU-KVM.