First published: Tue Sep 08 2015(Updated: )
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise Linux desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server eus | =6.7.z | |
redhat enterprise Linux workstation | =6.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
SPICE | <=0.12.5 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.1 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server eus | =7.1 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5260 has a severity rating that can lead to denial of service and potential arbitrary code execution.
To fix CVE-2015-5260, you should upgrade to SPICE version 0.12.6 or later.
CVE-2015-5260 affects various versions of SPICE, Red Hat Enterprise Linux, Debian, and Ubuntu.
CVE-2015-5260 can enable heap-based memory corruption and crash of QEMU-KVM.
Yes, CVE-2015-5260 can potentially be exploited by guest OS users to compromise the host.