First published: Fri Jan 11 2019(Updated: )
An off-by-one error was found in spice when accessing arrays. A malicious guest user can use this for a host denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/spice | <=0.14.0-1.2<=0.12.8-2.1<=0.12.8-2.1+deb9u2 | 0.12.8-2.1+deb9u3 0.14.0-1.3 |
Spice Project Spice | >=0.5.2<=0.14.1 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
redhat/spice | <0.14.2 | 0.14.2 |
debian/spice | 0.14.3-2.1 0.15.1-1 0.15.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-3813.
The severity of CVE-2019-3813 is high (7.5).
The affected software is Spice versions 0.5.2 through 0.14.1.
CVE-2019-3813 can be exploited by unauthenticated attackers to perform a denial of service attack or potentially execute arbitrary code.
To mitigate the vulnerability in Spice versions 0.5.2 through 0.14.1, it is recommended to apply the available patches or updates provided by the vendor.