First published: Fri Jan 11 2019(Updated: )
An off-by-one error was found in spice when accessing arrays. A malicious guest user can use this for a host denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/spice | <=0.14.0-1.2<=0.12.8-2.1<=0.12.8-2.1+deb9u2 | 0.12.8-2.1+deb9u3 0.14.0-1.3 |
redhat/spice | <0.14.2 | 0.14.2 |
debian/spice | 0.14.3-2.1 0.15.1-1 0.15.2-1 | |
SPICE | >=0.5.2<=0.14.1 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-3813.
The severity of CVE-2019-3813 is high (7.5).
The affected software is Spice versions 0.5.2 through 0.14.1.
CVE-2019-3813 can be exploited by unauthenticated attackers to perform a denial of service attack or potentially execute arbitrary code.
To mitigate the vulnerability in Spice versions 0.5.2 through 0.14.1, it is recommended to apply the available patches or updates provided by the vendor.