First published: Thu Jun 09 2016(Updated: )
The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
openSUSE | =13.2 | |
Debian GNU/Linux | =8.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =6.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux workstation | =7.0 | |
SPICE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0749 has a high severity due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2016-0749, update your SPICE package to the latest version provided by your operating system vendor.
CVE-2016-0749 affects multiple operating systems including openSUSE Leap 42.1, openSUSE 13.2, Debian 8.0, and various versions of Red Hat Enterprise Linux.
CVE-2016-0749 is classified as a heap-based buffer overflow vulnerability.
Yes, CVE-2016-0749 can potentially allow remote attackers to execute arbitrary code.