First published: Thu Sep 10 2015(Updated: )
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.7.z | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.1 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.1 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
SPICE | <=0.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5261 is classified as a high severity vulnerability due to its potential for arbitrary memory access.
To fix CVE-2015-5261, update SPICE to version 0.12.6 or later.
CVE-2015-5261 affects multiple versions of Ubuntu, Red Hat Enterprise Linux, and Debian.
CVE-2015-5261 is a heap-based buffer overflow vulnerability.
Yes, CVE-2015-5261 can be exploited remotely by a guest OS user via QXL commands.