First published: Mon Dec 05 2016(Updated: )
A buffer overflow vulnerability in main_channel_alloc_msg_rcv_buf was found that occurs when reading large messages due to missing buffer size check. Product bug: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1401038">https://bugzilla.redhat.com/show_bug.cgi?id=1401038</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/spice | 0.14.0-1.3+deb10u1 0.14.3-2.1 0.15.1-1 | |
debian/spice | <=0.12.5-1<=0.12.8-2 | 0.12.5-1+deb8u4 0.12.8-2.1 |
redhat/spice | <0.13.90 | 0.13.90 |
SPICE | <0.13.90 | |
Debian | =8.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9577 is classified as a medium severity vulnerability due to the potential for buffer overflow attacks.
To fix CVE-2016-9577, update to the fixed versions of the spice package specified in your operating system's vulnerability notice.
Affected versions of spice include 0.14.0-1.3+deb10u1, 0.14.3-2.1, and versions up to 0.13.90 for earlier releases.
CVE-2016-9577 can allow an attacker to execute arbitrary code or crash the affected system by sending maliciously crafted large messages.
As of the last reported assessments, there have been no confirmed active exploits targeting CVE-2016-9577.