First published: Thu Jun 28 2018(Updated: )
A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/spice | <=0.14.0-1<=0.12.8-1 | 0.14.0-1.1 0.12.8-2.1+deb9u2 |
Spice Project Spice | <0.14.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/spice | <0.14.1 | 0.14.1 |
redhat/spice-gtk | <0.36 | 0.36 |
ubuntu/spice | <0.14.0-1ubuntu2.2 | 0.14.0-1ubuntu2.2 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.14.0-1ubuntu4 | 0.14.0-1ubuntu4 |
ubuntu/spice | <0.12.4-0 | 0.12.4-0 |
ubuntu/spice | <0.14.0-1.1 | 0.14.0-1.1 |
ubuntu/spice-gtk | <0.35-1 | 0.35-1 |
ubuntu/spice-protocol | <0.12.10-1ubuntu0.2 | 0.12.10-1ubuntu0.2 |
debian/spice | 0.14.3-2.1 0.15.1-1 0.15.2-1 | |
debian/spice-gtk | 0.39-1 0.42-1 0.42-2.1 |
https://gitlab.freedesktop.org/spice/spice-common/commit/bb15d4815ab586b4c4a20f4a565970a44824c42c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10873.
The severity of CVE-2018-10873 is high, with a severity value of 8.8.
SPICE before version 0.14.1 and spice-gtk before version 0.36 are affected by CVE-2018-10873.
A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or potential exploitation.
The remedy for CVE-2018-10873 is to upgrade to SPICE version 0.14.1 or higher.