ID FEDORA_2015-A78EBCC142.NASL Type nessus Reporter This script is Copyright (C) 2016-2021 Tenable Network Security, Inc. Modified 2016-03-04T00:00:00
Description
Update spice-gtk/spice-protocol/spice to new upstream releases. The
spice update fixes CVE-2015-3247, CVE-2015-5260 and CVE-2015-5261.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2015-a78ebcc142.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(89356);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_xref(name:"FEDORA", value:"2015-a78ebcc142");
script_name(english:"Fedora 23 : mingw-spice-gtk-0.30-1.fc23 / mingw-spice-protocol-0.12.10-1.fc23 / spice-0.12.6-1.fc23 / etc (2015-a78ebcc142)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Update spice-gtk/spice-protocol/spice to new upstream releases. The
spice update fixes CVE-2015-3247, CVE-2015-5260 and CVE-2015-5261.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169102.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?a80793de"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169103.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?fc300c51"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169104.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c2eea484"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169105.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?280f132f"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169106.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?f21d8ec9"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mingw-spice-gtk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mingw-spice-protocol");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spice");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spice-gtk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spice-protocol");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:23");
script_set_attribute(attribute:"patch_publication_date", value:"2015/10/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/03/04");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^23([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 23.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC23", reference:"mingw-spice-gtk-0.30-1.fc23")) flag++;
if (rpm_check(release:"FC23", reference:"mingw-spice-protocol-0.12.10-1.fc23")) flag++;
if (rpm_check(release:"FC23", reference:"spice-0.12.6-1.fc23")) flag++;
if (rpm_check(release:"FC23", reference:"spice-gtk-0.30-1.fc23")) flag++;
if (rpm_check(release:"FC23", reference:"spice-protocol-0.12.10-1.fc23")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mingw-spice-gtk / mingw-spice-protocol / spice / spice-gtk / etc");
}
{"id": "FEDORA_2015-A78EBCC142.NASL", "bulletinFamily": "scanner", "title": "Fedora 23 : mingw-spice-gtk-0.30-1.fc23 / mingw-spice-protocol-0.12.10-1.fc23 / spice-0.12.6-1.fc23 / etc (2015-a78ebcc142)", "description": "Update spice-gtk/spice-protocol/spice to new upstream releases. The\nspice update fixes CVE-2015-3247, CVE-2015-5260 and CVE-2015-5261.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2016-03-04T00:00:00", "modified": "2016-03-04T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/89356", "reporter": "This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.", "references": ["http://www.nessus.org/u?c2eea484", "http://www.nessus.org/u?f21d8ec9", "http://www.nessus.org/u?a80793de", "http://www.nessus.org/u?fc300c51", "http://www.nessus.org/u?280f132f"], "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "type": "nessus", "lastseen": "2021-01-12T10:13:52", "edition": 15, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"]}, {"type": "archlinux", "idList": ["ASA-201510-13"]}, {"type": "fedora", "idList": ["FEDORA:894B46087BDB", "FEDORA:9674D6087BDE", "FEDORA:F3D9D6062E3B", "FEDORA:A636A6087C39", "FEDORA:10426606180C", "FEDORA:18E5D606091C", "FEDORA:9E7FF6087C37", "FEDORA:095B060620EF", "FEDORA:E96E36069A7B", "FEDORA:AEA3C6087C3B"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310122711", "OPENVAS:1361412562310806563", "OPENVAS:1361412562310130000", "OPENVAS:703371", "OPENVAS:1361412562310806562", "OPENVAS:1361412562310806561", "OPENVAS:1361412562310871459", "OPENVAS:1361412562310882297", "OPENVAS:1361412562310806566", "OPENVAS:1361412562310806564"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2015-1889.NASL", "OPENSUSE-2015-657.NASL", "FEDORA_2015-7FCC957BA6.NASL", "DEBIAN_DSA-3371.NASL", "CENTOS_RHSA-2015-1890.NASL", "SUSE_SU-2015-1733-1.NASL", "CENTOS_RHSA-2015-1889.NASL", "SL_20151012_SPICE_SERVER_ON_SL6_X.NASL", "SUSE_SU-2016-1259-1.NASL", "SL_20151012_SPICE_ON_SL7_X.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:32534", "SECURITYVULNS:VULN:14683", "SECURITYVULNS:VULN:14706", "SECURITYVULNS:DOC:32501"]}, {"type": "oraclelinux", "idList": ["ELSA-2015-1715", "ELSA-2015-1889", "ELSA-2015-1890", "ELSA-2015-1714"]}, {"type": "redhat", "idList": ["RHSA-2015:1713", "RHSA-2015:1890", "RHSA-2015:1889", "RHSA-2015:1714", "RHSA-2015:1715"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3371-1:CE6F2", "DEBIAN:DSA-3354-1:A17F2"]}, {"type": "centos", "idList": ["CESA-2015:1714", "CESA-2015:1715", "CESA-2015:1889", "CESA-2015:1890"]}, {"type": "ubuntu", "idList": ["USN-2766-1", "USN-2736-1"]}, {"type": "gentoo", "idList": ["GLSA-201606-05"]}], "modified": "2021-01-12T10:13:52", "rev": 2}, "score": {"value": 5.6, "vector": "NONE", "modified": "2021-01-12T10:13:52", "rev": 2}, "vulnersScore": 5.6}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-a78ebcc142.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89356);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_xref(name:\"FEDORA\", value:\"2015-a78ebcc142\");\n\n script_name(english:\"Fedora 23 : mingw-spice-gtk-0.30-1.fc23 / mingw-spice-protocol-0.12.10-1.fc23 / spice-0.12.6-1.fc23 / etc (2015-a78ebcc142)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update spice-gtk/spice-protocol/spice to new upstream releases. The\nspice update fixes CVE-2015-3247, CVE-2015-5260 and CVE-2015-5261.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169102.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a80793de\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169103.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fc300c51\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169104.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c2eea484\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169105.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?280f132f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-October/169106.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f21d8ec9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mingw-spice-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mingw-spice-protocol\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:spice\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:spice-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:spice-protocol\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:23\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^23([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 23.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC23\", reference:\"mingw-spice-gtk-0.30-1.fc23\")) flag++;\nif (rpm_check(release:\"FC23\", reference:\"mingw-spice-protocol-0.12.10-1.fc23\")) flag++;\nif (rpm_check(release:\"FC23\", reference:\"spice-0.12.6-1.fc23\")) flag++;\nif (rpm_check(release:\"FC23\", reference:\"spice-gtk-0.30-1.fc23\")) flag++;\nif (rpm_check(release:\"FC23\", reference:\"spice-protocol-0.12.10-1.fc23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mingw-spice-gtk / mingw-spice-protocol / spice / spice-gtk / etc\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "89356", "cpe": ["p-cpe:/a:fedoraproject:fedora:mingw-spice-gtk", "p-cpe:/a:fedoraproject:fedora:spice", "p-cpe:/a:fedoraproject:fedora:spice-protocol", "p-cpe:/a:fedoraproject:fedora:spice-gtk", "cpe:/o:fedoraproject:fedora:23", "p-cpe:/a:fedoraproject:fedora:mingw-spice-protocol"], "scheme": null}
{"cve": [{"lastseen": "2020-12-09T20:03:05", "description": "Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.", "edition": 5, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.1, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.2}, "published": "2016-06-07T14:06:00", "title": "CVE-2015-5261", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-5261"], "modified": "2017-09-16T01:29:00", "cpe": ["cpe:/a:spice_project:spice:0.12.5", "cpe:/o:canonical:ubuntu_linux:15.04", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux_workstation:7.0", "cpe:/o:redhat:enterprise_linux_hpc_node:7.0", "cpe:/o:redhat:enterprise_linux_hpc_node:6.0", "cpe:/o:debian:debian_linux:7.0", "cpe:/o:redhat:enterprise_linux_desktop:7.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_server_eus:7.1", "cpe:/o:redhat:enterprise_linux_hpc_node_eus:7.1", "cpe:/o:redhat:enterprise_linux_server_eus:6.7.z", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "CVE-2015-5261", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5261", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:spice_project:spice:0.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"]}, {"lastseen": "2020-12-09T20:03:05", "description": "Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.", "edition": 5, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-06-07T14:06:00", "title": "CVE-2015-5260", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-5260"], "modified": "2017-09-16T01:29:00", "cpe": ["cpe:/a:spice_project:spice:0.12.5", "cpe:/o:canonical:ubuntu_linux:15.04", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux_workstation:7.0", "cpe:/o:redhat:enterprise_linux_hpc_node:7.0", "cpe:/o:redhat:enterprise_linux_hpc_node:6.0", "cpe:/o:debian:debian_linux:7.0", "cpe:/o:redhat:enterprise_linux_desktop:7.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux_server_eus:7.1", "cpe:/o:redhat:enterprise_linux_hpc_node_eus:7.1", "cpe:/o:redhat:enterprise_linux_server_eus:6.7.z", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "CVE-2015-5260", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5260", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:spice_project:spice:0.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"]}, {"lastseen": "2020-10-03T12:49:50", "description": "Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.", "edition": 3, "cvss3": {}, "published": "2015-09-08T15:59:00", "title": "CVE-2015-3247", "type": "cve", "cwe": ["CWE-119", "CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3247"], "modified": "2019-04-22T17:48:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux:7.0", "cpe:/o:redhat:enterprise_linux_workstation:7.0", "cpe:/o:redhat:enterprise_linux_hpc_node:7.0", "cpe:/o:redhat:enterprise_linux_desktop:7.0", "cpe:/o:redhat:enterprise_linux_hpc_node:6", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/a:spice_project:spice:0.12.4", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "CVE-2015-3247", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3247", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:spice_project:spice:0.12.4:*:*:*:*:*:*:*"]}], "archlinux": [{"lastseen": "2016-09-02T18:44:49", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "description": "- CVE-2015-3247 (race condition flaw):\n\nA race condition flaw was found in spice's\nworker_update_monitors_config() function, leading to a heap-based memory\ncorruption. A user in a guest could leverage this flaw to crash the host\nQEMU-KVM process or, possibly, execute arbitrary code with the\nprivileges of the host QEMU-KVM process.\n\n- CVE-2015-5260 (heap-based buffer overflow):\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the "surface_id" parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process.\n\n- CVE-2015-5261 (heap-based buffer overflow):\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host.", "modified": "2015-10-19T00:00:00", "published": "2015-10-19T00:00:00", "id": "ASA-201510-13", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-October/000415.html", "type": "archlinux", "title": "spice: multiple issues", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2019-05-29T18:36:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-11-02T00:00:00", "id": "OPENVAS:1361412562310806563", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806563", "type": "openvas", "title": "Fedora Update for spice-protocol FEDORA-2015-7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for spice-protocol FEDORA-2015-7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806563\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-02 07:57:34 +0100 (Mon, 02 Nov 2015)\");\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for spice-protocol FEDORA-2015-7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'spice-protocol'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"spice-protocol on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170589.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"spice-protocol\", rpm:\"spice-protocol~0.12.10~1.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-11-02T00:00:00", "id": "OPENVAS:1361412562310806562", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806562", "type": "openvas", "title": "Fedora Update for mingw-spice-gtk FEDORA-2015-7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mingw-spice-gtk FEDORA-2015-7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806562\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-02 07:57:41 +0100 (Mon, 02 Nov 2015)\");\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for mingw-spice-gtk FEDORA-2015-7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mingw-spice-gtk'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"mingw-spice-gtk on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170591.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"mingw-spice-gtk\", rpm:\"mingw-spice-gtk~0.30~1.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-11-02T00:00:00", "id": "OPENVAS:1361412562310806561", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806561", "type": "openvas", "title": "Fedora Update for spice-gtk FEDORA-2015-7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for spice-gtk FEDORA-2015-7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806561\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-02 07:57:44 +0100 (Mon, 02 Nov 2015)\");\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for spice-gtk FEDORA-2015-7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'spice-gtk'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"spice-gtk on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170588.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"spice-gtk\", rpm:\"spice-gtk~0.30~1.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-11-02T00:00:00", "id": "OPENVAS:1361412562310806564", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806564", "type": "openvas", "title": "Fedora Update for spice FEDORA-2015-7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for spice FEDORA-2015-7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806564\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-02 07:58:08 +0100 (Mon, 02 Nov 2015)\");\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for spice FEDORA-2015-7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'spice'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"spice on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170587.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"spice\", rpm:\"spice~0.12.6~1.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2015-11-02T00:00:00", "id": "OPENVAS:1361412562310806566", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806566", "type": "openvas", "title": "Fedora Update for mingw-spice-protocol FEDORA-2015-7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mingw-spice-protocol FEDORA-2015-7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806566\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-02 07:57:47 +0100 (Mon, 02 Nov 2015)\");\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for mingw-spice-protocol FEDORA-2015-7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mingw-spice-protocol'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"mingw-spice-protocol on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2015-7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170590.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"mingw-spice-protocol\", rpm:\"mingw-spice-protocol~0.12.10~1.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2015-10-13T00:00:00", "id": "OPENVAS:1361412562310871459", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871459", "type": "openvas", "title": "RedHat Update for spice RHSA-2015:1890-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for spice RHSA-2015:1890-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871459\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-13 07:15:21 +0200 (Tue, 13 Oct 2015)\");\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"RedHat Update for spice RHSA-2015:1890-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'spice'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a guest\ncould use this flaw to read and write arbitrary memory locations on the\nhost. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or, possibly,\nexecute arbitrary code with the privileges of the host QEMU-KVM process.\n(CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.\");\n script_tag(name:\"affected\", value:\"spice on Red Hat Enterprise Linux Server (v. 7)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"RHSA\", value:\"2015:1890-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2015-October/msg00010.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_7\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"spice-debuginfo\", rpm:\"spice-debuginfo~0.12.4~9.el7_1.3\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"spice-server\", rpm:\"spice-server~0.12.4~9.el7_1.3\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "Check the version of spice-server", "modified": "2019-03-08T00:00:00", "published": "2015-10-13T00:00:00", "id": "OPENVAS:1361412562310882297", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882297", "type": "openvas", "title": "CentOS Update for spice-server CESA-2015:1889 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for spice-server CESA-2015:1889 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882297\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-13 07:15:56 +0200 (Tue, 13 Oct 2015)\");\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for spice-server CESA-2015:1889 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of spice-server\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a guest\ncould use this flaw to read and write arbitrary memory locations on the\nhost. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or, possibly,\nexecute arbitrary code with the privileges of the host QEMU-KVM process.\n(CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains backported patches to correct these issues.\");\n script_tag(name:\"affected\", value:\"spice-server on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_xref(name:\"CESA\", value:\"2015:1889\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2015-October/021428.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"spice-server\", rpm:\"spice-server~0.12.4~12.el6_7.3\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"spice-server-devel\", rpm:\"spice-server-devel~0.12.4~12.el6_7.3\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-24T12:53:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "Frediano Ziglio of Red Hat discovered several vulnerabilities in spice,\na SPICE protocol client and server library. A malicious guest can\nexploit these flaws to cause a denial of service (QEMU process crash),\nexecute arbitrary code on the host with the privileges of the hosting\nQEMU process or read and write arbitrary memory locations on the host.", "modified": "2017-07-07T00:00:00", "published": "2015-10-09T00:00:00", "id": "OPENVAS:703371", "href": "http://plugins.openvas.org/nasl.php?oid=703371", "type": "openvas", "title": "Debian Security Advisory DSA 3371-1 (spice - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3371.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3371-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703371);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_name(\"Debian Security Advisory DSA 3371-1 (spice - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-10-09 00:00:00 +0200 (Fri, 09 Oct 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3371.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"spice on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the oldstable distribution (wheezy), these problems have been fixed\nin version 0.11.0-1+deb7u2.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 0.12.5-1+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.12.5-1.3.\n\nWe recommend that you upgrade your spice packages.\");\n script_tag(name: \"summary\", value: \"Frediano Ziglio of Red Hat discovered several vulnerabilities in spice,\na SPICE protocol client and server library. A malicious guest can\nexploit these flaws to cause a denial of service (QEMU process crash),\nexecute arbitrary code on the host with the privileges of the hosting\nQEMU process or read and write arbitrary memory locations on the host.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libspice-server-dev\", ver:\"0.11.0-1+deb7u2\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libspice-server1\", ver:\"0.11.0-1+deb7u2\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"spice-client\", ver:\"0.11.0-1+deb7u2\", rls_regex:\"DEB7.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libspice-server-dev\", ver:\"0.12.5-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libspice-server1\", ver:\"0.12.5-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libspice-server1-dbg\", ver:\"0.12.5-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"spice-client\", ver:\"0.12.5-1+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2015-10-07T00:00:00", "id": "OPENVAS:1361412562310842485", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842485", "type": "openvas", "title": "Ubuntu Update for spice USN-2766-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for spice USN-2766-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842485\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-07 08:35:31 +0200 (Wed, 07 Oct 2015)\");\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for spice USN-2766-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'spice'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Frediano Ziglio discovered multiple buffer\noverflows, undefined behavior signed integer operations, race conditions, memory\nleaks, and denial of service issues in Spice. A malicious guest operating system\ncould potentially exploit these issues to escape virtualization. (CVE-2015-5260,\nCVE-2015-5261)\");\n script_tag(name:\"affected\", value:\"spice on Ubuntu 15.04,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2766-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2766-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(15\\.04|14\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU15.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libspice-server1:amd64\", ver:\"0.12.5-1ubuntu0.2\", rls:\"UBUNTU15.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libspice-server1:i386\", ver:\"0.12.5-1ubuntu0.2\", rls:\"UBUNTU15.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libspice-server1:amd64\", ver:\"0.12.4-0nocelt2ubuntu1.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libspice-server1:i386\", ver:\"0.12.4-0nocelt2ubuntu1.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "Frediano Ziglio of Red Hat discovered several vulnerabilities in spice,\na SPICE protocol client and server library. A malicious guest can\nexploit these flaws to cause a denial of service (QEMU process crash),\nexecute arbitrary code on the host with the privileges of the hosting\nQEMU process or read and write arbitrary memory locations on the host.", "modified": "2019-03-18T00:00:00", "published": "2015-10-09T00:00:00", "id": "OPENVAS:1361412562310703371", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703371", "type": "openvas", "title": "Debian Security Advisory DSA 3371-1 (spice - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3371.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3371-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703371\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_name(\"Debian Security Advisory DSA 3371-1 (spice - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-09 00:00:00 +0200 (Fri, 09 Oct 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3371.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(7|8)\");\n script_tag(name:\"affected\", value:\"spice on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (wheezy), these problems have been fixed\nin version 0.11.0-1+deb7u2.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 0.12.5-1+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.12.5-1.3.\n\nWe recommend that you upgrade your spice packages.\");\n script_tag(name:\"summary\", value:\"Frediano Ziglio of Red Hat discovered several vulnerabilities in spice,\na SPICE protocol client and server library. A malicious guest can\nexploit these flaws to cause a denial of service (QEMU process crash),\nexecute arbitrary code on the host with the privileges of the hosting\nQEMU process or read and write arbitrary memory locations on the host.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libspice-server-dev\", ver:\"0.11.0-1+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libspice-server1\", ver:\"0.11.0-1+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"spice-client\", ver:\"0.11.0-1+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libspice-server-dev\", ver:\"0.12.5-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libspice-server1\", ver:\"0.12.5-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libspice-server1-dbg\", ver:\"0.12.5-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"spice-client\", ver:\"0.12.5-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Header files describing the spice protocol and the para-virtual graphics card QXL. ", "modified": "2015-11-01T21:59:17", "published": "2015-11-01T21:59:17", "id": "FEDORA:A636A6087C39", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: mingw-spice-protocol-0.12.10-1.fc22", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Header files describing the spice protocol and the para-virtual graphics card QXL. ", "modified": "2015-10-11T16:08:04", "published": "2015-10-11T16:08:04", "id": "FEDORA:10426606180C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: spice-protocol-0.12.10-1.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Client libraries for SPICE desktop servers. ", "modified": "2015-11-01T21:59:17", "published": "2015-11-01T21:59:17", "id": "FEDORA:894B46087BDB", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: mingw-spice-gtk-0.30-1.fc22", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. ", "modified": "2015-10-11T16:08:04", "published": "2015-10-11T16:08:04", "id": "FEDORA:095B060620EF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: spice-0.12.6-1.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. ", "modified": "2015-11-01T21:59:17", "published": "2015-11-01T21:59:17", "id": "FEDORA:9E7FF6087C37", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: spice-0.12.6-1.fc22", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Header files describing the spice protocol and the para-virtual graphics card QXL. ", "modified": "2015-11-01T21:59:17", "published": "2015-11-01T21:59:17", "id": "FEDORA:AEA3C6087C3B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: spice-protocol-0.12.10-1.fc22", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Client libraries for SPICE desktop servers. ", "modified": "2015-10-11T16:08:03", "published": "2015-10-11T16:08:03", "id": "FEDORA:E96E36069A7B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: spice-gtk-0.30-1.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Client libraries for SPICE desktop servers. ", "modified": "2015-10-11T16:08:03", "published": "2015-10-11T16:08:03", "id": "FEDORA:F3D9D6062E3B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: mingw-spice-gtk-0.30-1.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Client libraries for SPICE desktop servers. ", "modified": "2015-11-01T21:59:17", "published": "2015-11-01T21:59:17", "id": "FEDORA:9674D6087BDE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: spice-gtk-0.30-1.fc22", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247", "CVE-2015-5260", "CVE-2015-5261"], "description": "Header files describing the spice protocol and the para-virtual graphics card QXL. ", "modified": "2015-10-11T16:08:04", "published": "2015-10-11T16:08:04", "id": "FEDORA:18E5D606091C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: mingw-spice-protocol-0.12.10-1.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-07T14:23:05", "description": "Spice was updated to fix three security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-3247: heap corruption in the spice server\n (bsc#944460)\n\n - CVE-2015-5261: Guest could have accessed host memory\n using crafted images (bsc#948976)\n\n - CVE-2015-5260: Insufficient validation of surface_id\n parameter could have caused a crash (bsc#944460)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 28, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-15T00:00:00", "title": "SUSE SLED12 / SLES12 Security Update : spice (SUSE-SU-2015:1733-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "modified": "2015-10-15T00:00:00", "cpe": ["cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:spice-debugsource", "p-cpe:/a:novell:suse_linux:libspice-server1-debuginfo", "p-cpe:/a:novell:suse_linux:libspice-server1"], "id": "SUSE_SU-2015-1733-1.NASL", "href": "https://www.tenable.com/plugins/nessus/86397", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:1733-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86397);\n script_version(\"2.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : spice (SUSE-SU-2015:1733-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Spice was updated to fix three security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-3247: heap corruption in the spice server\n (bsc#944460)\n\n - CVE-2015-5261: Guest could have accessed host memory\n using crafted images (bsc#948976)\n\n - CVE-2015-5260: Insufficient validation of surface_id\n parameter could have caused a crash (bsc#944460)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944460\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=948976\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-3247/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-5260/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-5261/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20151733-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c25d4212\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12 :\n\nzypper in -t patch SUSE-SLE-SDK-12-2015-674=1\n\nSUSE Linux Enterprise Server 12 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-2015-674=1\n\nSUSE Linux Enterprise Desktop 12 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-2015-674=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libspice-server1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libspice-server1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:spice-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libspice-server1-0.12.4-8.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"libspice-server1-debuginfo-0.12.4-8.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"spice-debugsource-0.12.4-8.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"libspice-server1-0.12.4-8.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"libspice-server1-debuginfo-0.12.4-8.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"spice-debugsource-0.12.4-8.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spice\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:13:46", "description": "Update spice-gtk/spice-protocol/spice to new upstream releases. The\nspice update fixes CVE-2015-3247, CVE-2015-5260 and CVE-2015-5261.\n---- Update to spice- gtk 0.29 ---- Update to release 0.12.7\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 15, "published": "2016-03-04T00:00:00", "title": "Fedora 22 : mingw-spice-gtk-0.30-1.fc22 / mingw-spice-protocol-0.12.10-1.fc22 / spice-0.12.6-1.fc22 / etc (2015-7fcc957ba6)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "modified": "2016-03-04T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:mingw-spice-gtk", "p-cpe:/a:fedoraproject:fedora:spice", "cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:spice-protocol", "p-cpe:/a:fedoraproject:fedora:spice-gtk", "p-cpe:/a:fedoraproject:fedora:mingw-spice-protocol"], "id": "FEDORA_2015-7FCC957BA6.NASL", "href": "https://www.tenable.com/plugins/nessus/89303", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-7fcc957ba6.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89303);\n script_version(\"2.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_xref(name:\"FEDORA\", value:\"2015-7fcc957ba6\");\n\n script_name(english:\"Fedora 22 : mingw-spice-gtk-0.30-1.fc22 / mingw-spice-protocol-0.12.10-1.fc22 / spice-0.12.6-1.fc22 / etc (2015-7fcc957ba6)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update spice-gtk/spice-protocol/spice to new upstream releases. The\nspice update fixes CVE-2015-3247, CVE-2015-5260 and CVE-2015-5261.\n---- Update to spice- gtk 0.29 ---- Update to release 0.12.7\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170587.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f3546097\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170588.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7030d9aa\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170589.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f81f3dda\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170590.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a90799fc\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-November/170591.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?158f1c66\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mingw-spice-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mingw-spice-protocol\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:spice\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:spice-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:spice-protocol\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"mingw-spice-gtk-0.30-1.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"mingw-spice-protocol-0.12.10-1.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"spice-0.12.6-1.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"spice-gtk-0.30-1.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"spice-protocol-0.12.10-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mingw-spice-gtk / mingw-spice-protocol / spice / spice-gtk / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T14:45:36", "description": "Spice was updated to fix three security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-3247: heap corruption in the spice server\n (bsc#944460)\n\n - CVE-2015-5261: Guest could have accessed host memory\n using crafted images (bsc#948976)\n\n - CVE-2015-5260: Insufficient validation of surface_id\n parameter could have caused a crash (bsc#944787)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-05-09T00:00:00", "title": "SUSE SLES11 Security Update : spice (SUSE-SU-2016:1259-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "modified": "2016-05-09T00:00:00", "cpe": ["cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:libspice-server1"], "id": "SUSE_SU-2016-1259-1.NASL", "href": "https://www.tenable.com/plugins/nessus/90995", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:1259-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(90995);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n\n script_name(english:\"SUSE SLES11 Security Update : spice (SUSE-SU-2016:1259-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Spice was updated to fix three security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-3247: heap corruption in the spice server\n (bsc#944460)\n\n - CVE-2015-5261: Guest could have accessed host memory\n using crafted images (bsc#948976)\n\n - CVE-2015-5260: Insufficient validation of surface_id\n parameter could have caused a crash (bsc#944787)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944460\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=944787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=948976\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-3247/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-5260/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-5261/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20161259-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3ca58797\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4 :\n\nzypper in -t patch sdksp4-spice-12542=1\n\nSUSE Linux Enterprise Server 11-SP4 :\n\nzypper in -t patch slessp4-spice-12542=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4 :\n\nzypper in -t patch dbgsp4-spice-12542=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libspice-server1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/05/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/05/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"i386|i486|i586|i686|x86_64\") audit(AUDIT_ARCH_NOT, \"i386 / i486 / i586 / i686 / x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"libspice-server1-0.12.4-5.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"libspice-server1-0.12.4-5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spice\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T12:28:48", "description": "Spice was updated to fix four security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-3247: heap corruption in the spice server\n (bsc#944460)\n\n - CVE-2015-5261: Guest could have accessed host memory\n using crafted images (bsc#948976)\n\n - CVE-2015-5260: Insufficient validation of surface_id\n parameter could have caused a crash (bsc#944460)\n\n - CVE-2013-4282: Buffer overflow in password handling\n (bsc#848279)", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-15T00:00:00", "title": "openSUSE Security Update : spice (openSUSE-2015-657)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4282", "CVE-2015-5261", "CVE-2015-5260", "CVE-2015-3247"], "modified": "2015-10-15T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:spice-debugsource", "p-cpe:/a:novell:opensuse:libspice-server1", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:libspice-server-devel", "p-cpe:/a:novell:opensuse:spice-client", "p-cpe:/a:novell:opensuse:libspice-server1-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:spice-client-debuginfo"], "id": "OPENSUSE-2015-657.NASL", "href": "https://www.tenable.com/plugins/nessus/86392", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-657.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86392);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-4282\", \"CVE-2015-3247\", \"CVE-2015-5260\", \"CVE-2015-5261\");\n\n script_name(english:\"openSUSE Security Update : spice (openSUSE-2015-657)\");\n script_summary(english:\"Check for the openSUSE-2015-657 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Spice was updated to fix four security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-3247: heap corruption in the spice server\n (bsc#944460)\n\n - CVE-2015-5261: Guest could have accessed host memory\n using crafted images (bsc#948976)\n\n - CVE-2015-5260: Insufficient validation of surface_id\n parameter could have caused a crash (bsc#944460)\n\n - CVE-2013-4282: Buffer overflow in password handling\n (bsc#848279)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=848279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=944460\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=944787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=948976\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected spice packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libspice-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libspice-server1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libspice-server1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:spice-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:spice-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:spice-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libspice-server-devel-0.12.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libspice-server1-0.12.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libspice-server1-debuginfo-0.12.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"spice-client-0.12.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"spice-client-debuginfo-0.12.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"spice-debugsource-0.12.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"libspice-server-devel-0.12.4-4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"libspice-server1-0.12.4-4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"libspice-server1-debuginfo-0.12.4-4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"spice-client-0.12.4-4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"spice-client-debuginfo-0.12.4-4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"spice-debugsource-0.12.4-4.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libspice-server-devel / libspice-server1 / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:50:11", "description": "From Red Hat Security Advisory 2015:1890 :\n\nUpdated spice packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is\na remote display protocol for virtual environments. SPICE users can\naccess a virtualized desktop or server from the local system or any\nsystem with network access to the server. SPICE is used in Red Hat\nEnterprise Linux for viewing virtualized guests running on the\nKernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise\nVirtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-13T00:00:00", "title": "Oracle Linux 7 : spice (ELSA-2015-1890)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "modified": "2015-10-13T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:spice-server", "p-cpe:/a:oracle:linux:spice-server-devel", "cpe:/o:oracle:linux:7"], "id": "ORACLELINUX_ELSA-2015-1890.NASL", "href": "https://www.tenable.com/plugins/nessus/86360", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2015:1890 and \n# Oracle Linux Security Advisory ELSA-2015-1890 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86360);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_xref(name:\"RHSA\", value:\"2015:1890\");\n\n script_name(english:\"Oracle Linux 7 : spice (ELSA-2015-1890)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2015:1890 :\n\nUpdated spice packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is\na remote display protocol for virtual environments. SPICE users can\naccess a virtualized desktop or server from the local system or any\nsystem with network access to the server. SPICE is used in Red Hat\nEnterprise Linux for viewing virtualized guests running on the\nKernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise\nVirtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2015-October/005453.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected spice packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:spice-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:spice-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"spice-server-0.12.4-9.el7_1.3\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"spice-server-devel-0.12.4-9.el7_1.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spice-server / spice-server-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:30:20", "description": "An updated spice-server package that fixes two security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is\na remote display protocol for virtual environments. SPICE users can\naccess a virtualized desktop or server from the local system or any\nsystem with network access to the server. SPICE is used in Red Hat\nEnterprise Linux for viewing virtualized guests running on the\nKernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise\nVirtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains backported patches to correct these issues.", "edition": 30, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-21T00:00:00", "title": "CentOS 6 : spice-server (CESA-2015:1889)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "modified": "2015-10-21T00:00:00", "cpe": ["p-cpe:/a:centos:centos:spice-server", "cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:spice-server-devel"], "id": "CENTOS_RHSA-2015-1889.NASL", "href": "https://www.tenable.com/plugins/nessus/86483", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1889 and \n# CentOS Errata and Security Advisory 2015:1889 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86483);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_xref(name:\"RHSA\", value:\"2015:1889\");\n\n script_name(english:\"CentOS 6 : spice-server (CESA-2015:1889)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated spice-server package that fixes two security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is\na remote display protocol for virtual environments. SPICE users can\naccess a virtualized desktop or server from the local system or any\nsystem with network access to the server. SPICE is used in Red Hat\nEnterprise Linux for viewing virtualized guests running on the\nKernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise\nVirtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains backported patches to correct these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2015-October/021428.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?293b6c67\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected spice-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-5260\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:spice-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:spice-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", cpu:\"x86_64\", reference:\"spice-server-0.12.4-12.el6_7.3\")) flag++;\nif (rpm_check(release:\"CentOS-6\", cpu:\"x86_64\", reference:\"spice-server-devel-0.12.4-12.el6_7.3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spice-server / spice-server-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:48:59", "description": "A heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)", "edition": 16, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-13T00:00:00", "title": "Scientific Linux Security Update : spice-server on SL6.x x86_64 (20151012)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "modified": "2015-10-13T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:spice-server", "p-cpe:/a:fermilab:scientific_linux:spice-server-devel", "p-cpe:/a:fermilab:scientific_linux:spice-server-debuginfo", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20151012_SPICE_SERVER_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/86364", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86364);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n\n script_name(english:\"Scientific Linux Security Update : spice-server on SL6.x x86_64 (20151012)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1510&L=scientific-linux-errata&F=&S=&P=953\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?20a83935\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected spice-server, spice-server-debuginfo and / or\nspice-server-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:spice-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:spice-server-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:spice-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"spice-server-0.12.4-12.el6_7.3\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"spice-server-debuginfo-0.12.4-12.el6_7.3\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"spice-server-devel-0.12.4-12.el6_7.3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spice-server / spice-server-debuginfo / spice-server-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T09:49:15", "description": "Frediano Ziglio of Red Hat discovered several vulnerabilities in\nspice, a SPICE protocol client and server library. A malicious guest\ncan exploit these flaws to cause a denial of service (QEMU process\ncrash), execute arbitrary code on the host with the privileges of the\nhosting QEMU process or read and write arbitrary memory locations on\nthe host.", "edition": 22, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-12T00:00:00", "title": "Debian DSA-3371-1 : spice - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "modified": "2015-10-12T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:spice", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-3371.NASL", "href": "https://www.tenable.com/plugins/nessus/86329", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3371. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86329);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_xref(name:\"DSA\", value:\"3371\");\n\n script_name(english:\"Debian DSA-3371-1 : spice - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Frediano Ziglio of Red Hat discovered several vulnerabilities in\nspice, a SPICE protocol client and server library. A malicious guest\ncan exploit these flaws to cause a denial of service (QEMU process\ncrash), execute arbitrary code on the host with the privileges of the\nhosting QEMU process or read and write arbitrary memory locations on\nthe host.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801089\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/spice\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/spice\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3371\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the spice packages.\n\nFor the oldstable distribution (wheezy), these problems have been\nfixed in version 0.11.0-1+deb7u2.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 0.12.5-1+deb8u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:spice\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libspice-server-dev\", reference:\"0.11.0-1+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libspice-server1\", reference:\"0.11.0-1+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"spice-client\", reference:\"0.11.0-1+deb7u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libspice-server-dev\", reference:\"0.12.5-1+deb8u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libspice-server1\", reference:\"0.12.5-1+deb8u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libspice-server1-dbg\", reference:\"0.12.5-1+deb8u2\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"spice-client\", reference:\"0.12.5-1+deb8u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:30:21", "description": "Updated spice packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is\na remote display protocol for virtual environments. SPICE users can\naccess a virtualized desktop or server from the local system or any\nsystem with network access to the server. SPICE is used in Red Hat\nEnterprise Linux for viewing virtualized guests running on the\nKernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise\nVirtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "edition": 30, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-21T00:00:00", "title": "CentOS 7 : spice (CESA-2015:1890)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "modified": "2015-10-21T00:00:00", "cpe": ["p-cpe:/a:centos:centos:spice-server", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:spice-server-devel"], "id": "CENTOS_RHSA-2015-1890.NASL", "href": "https://www.tenable.com/plugins/nessus/86484", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1890 and \n# CentOS Errata and Security Advisory 2015:1890 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86484);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_xref(name:\"RHSA\", value:\"2015:1890\");\n\n script_name(english:\"CentOS 7 : spice (CESA-2015:1890)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated spice packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is\na remote display protocol for virtual environments. SPICE users can\naccess a virtualized desktop or server from the local system or any\nsystem with network access to the server. SPICE is used in Red Hat\nEnterprise Linux for viewing virtualized guests running on the\nKernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise\nVirtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a\nguest could use this flaw to read and write arbitrary memory locations\non the host. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the 'surface_id' parameter. A user in\na guest could use this flaw to crash the host QEMU-KVM process or,\npossibly, execute arbitrary code with the privileges of the host\nQEMU-KVM process. (CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2015-October/021429.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?01c8f4d2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected spice packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-5260\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:spice-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:spice-server-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"spice-server-0.12.4-9.el7_1.3\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"spice-server-devel-0.12.4-9.el7_1.3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spice-server / spice-server-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:29:07", "description": "Frediano Ziglio discovered multiple buffer overflows, undefined\nbehavior signed integer operations, race conditions, memory leaks, and\ndenial of service issues in Spice. A malicious guest operating system\ncould potentially exploit these issues to escape virtualization.\n(CVE-2015-5260, CVE-2015-5261).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-07T00:00:00", "title": "Ubuntu 14.04 LTS / 15.04 : spice vulnerabilities (USN-2766-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "modified": "2015-10-07T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:15.04", "p-cpe:/a:canonical:ubuntu_linux:libspice-server1", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2766-1.NASL", "href": "https://www.tenable.com/plugins/nessus/86310", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2766-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86310);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-5260\", \"CVE-2015-5261\");\n script_xref(name:\"USN\", value:\"2766-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 15.04 : spice vulnerabilities (USN-2766-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Frediano Ziglio discovered multiple buffer overflows, undefined\nbehavior signed integer operations, race conditions, memory leaks, and\ndenial of service issues in Spice. A malicious guest operating system\ncould potentially exploit these issues to escape virtualization.\n(CVE-2015-5260, CVE-2015-5261).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2766-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libspice-server1 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libspice-server1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"libspice-server1\", pkgver:\"0.12.4-0nocelt2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"libspice-server1\", pkgver:\"0.12.5-1ubuntu0.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libspice-server1\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "\r\n\r\n-------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3371-1 security@debian.org\r\nhttps://www.debian.org/security/ Salvatore Bonaccorso\r\nOctober 09, 2015 https://www.debian.org/security/faq\r\n-------------------------------------------------------------------------\r\n\r\nPackage : spice\r\nCVE ID : CVE-2015-5260 CVE-2015-5261\r\nDebian Bug : 801089 801091\r\n\r\nFrediano Ziglio of Red Hat discovered several vulnerabilities in spice,\r\na SPICE protocol client and server library. A malicious guest can\r\nexploit these flaws to cause a denial of service (QEMU process crash),\r\nexecute arbitrary code on the host with the privileges of the hosting\r\nQEMU process or read and write arbitrary memory locations on the host.\r\n\r\nFor the oldstable distribution (wheezy), these problems have been fixed\r\nin version 0.11.0-1+deb7u2.\r\n\r\nFor the stable distribution (jessie), these problems have been fixed in\r\nversion 0.12.5-1+deb8u2.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 0.12.5-1.3.\r\n\r\nWe recommend that you upgrade your spice packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n\r\n", "edition": 1, "modified": "2015-10-11T00:00:00", "published": "2015-10-11T00:00:00", "id": "SECURITYVULNS:DOC:32534", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32534", "title": "[SECURITY] [DSA 3371-1] spice security update", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "Few different vulnerabilities.", "edition": 1, "modified": "2015-10-11T00:00:00", "published": "2015-10-11T00:00:00", "id": "SECURITYVULNS:VULN:14706", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14706", "title": "spice memory corruption", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:11:01", "bulletinFamily": "software", "cvelist": ["CVE-2015-3247"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2736-1\r\nSeptember 08, 2015\r\n\r\nspice vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n\r\nSummary:\r\n\r\nSpice could be made to crash or run programs.\r\n\r\nSoftware Description:\r\n- spice: SPICE protocol client and server library\r\n\r\nDetails:\r\n\r\nFrediano Ziglio discovered that Spice incorrectly handled monitor configs.\r\nA malicious guest could use this issue to cause a denial of service, or\r\npossibly execute arbitrary code on the host as the user running the QEMU\r\nprocess. In the default installation, when QEMU is used with libvirt,\r\nattackers would be isolated by the libvirt AppArmor profile.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.04:\r\n libspice-server1 0.12.5-1ubuntu0.1\r\n\r\nUbuntu 14.04 LTS:\r\n libspice-server1 0.12.4-0nocelt2ubuntu1.1\r\n\r\nAfter a standard system update you need to restart all QEMU virtual\r\nmachines using Spice to make the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2736-1\r\n CVE-2015-3247\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/spice/0.12.5-1ubuntu0.1\r\n https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.1\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-09-14T00:00:00", "published": "2015-09-14T00:00:00", "id": "SECURITYVULNS:DOC:32501", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32501", "title": "[USN-2736-1] Spice vulnerability", "type": "securityvulns", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-3247"], "description": "Race conditions lead to memory corruption.", "edition": 1, "modified": "2015-09-14T00:00:00", "published": "2015-09-14T00:00:00", "id": "SECURITYVULNS:VULN:14683", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14683", "title": "spice race conditions", "type": "securityvulns", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:38", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "[0.12.4-12.3]\n- CVE-2015-5260 CVE-2015-5261 fixed various security flaws\n Resolves: rhbz#1262769\n[0.12.4-12.2]\n- Validate surface_id\n Resolves: rhbz#1262769", "edition": 4, "modified": "2015-10-12T00:00:00", "published": "2015-10-12T00:00:00", "id": "ELSA-2015-1889", "href": "http://linux.oracle.com/errata/ELSA-2015-1889.html", "title": "spice-server security update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:50", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "[0.12.4-9.3]\n- CVE-2015-5260 CVE-2015-5261 fixed various security flaws\n Resolves: rhbz#1262771\n[0.12.4-9.2]\n- Validate surface_id\n Resolves: rhbz#1262771", "edition": 4, "modified": "2015-10-12T00:00:00", "published": "2015-10-12T00:00:00", "id": "ELSA-2015-1890", "href": "http://linux.oracle.com/errata/ELSA-2015-1890.html", "title": "spice security update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:03", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "[0.12.4-12.1]\n- Avoid race conditions reading monitor configs from guest. This race could\n trigger memory corruption host-side\n Resolves: rhbz#1239124", "edition": 4, "modified": "2015-09-03T00:00:00", "published": "2015-09-03T00:00:00", "id": "ELSA-2015-1715", "href": "http://linux.oracle.com/errata/ELSA-2015-1715.html", "title": "spice-server security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:22", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "[0.12.4-9.1]\n- Avoid race conditions reading monitor configs from guest. This race could\n trigger memory corruption host-side\n Resolves: rhbz#1239127", "edition": 4, "modified": "2015-09-03T00:00:00", "published": "2015-09-03T00:00:00", "id": "ELSA-2015-1714", "href": "http://linux.oracle.com/errata/ELSA-2015-1714.html", "title": "spice security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-18T01:35:11", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "Frediano Ziglio discovered multiple buffer overflows, undefined behavior \nsigned integer operations, race conditions, memory leaks, and denial \nof service issues in Spice. A malicious guest operating system could \npotentially exploit these issues to escape virtualization. (CVE-2015-5260, \nCVE-2015-5261)", "edition": 6, "modified": "2015-10-07T00:00:00", "published": "2015-10-07T00:00:00", "id": "USN-2766-1", "href": "https://ubuntu.com/security/notices/USN-2766-1", "title": "Spice vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:41:07", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "Frediano Ziglio discovered that Spice incorrectly handled monitor configs. \nA malicious guest could use this issue to cause a denial of service, or \npossibly execute arbitrary code on the host as the user running the QEMU \nprocess. In the default installation, when QEMU is used with libvirt, \nattackers would be isolated by the libvirt AppArmor profile.", "edition": 5, "modified": "2015-09-08T00:00:00", "published": "2015-09-08T00:00:00", "id": "USN-2736-1", "href": "https://ubuntu.com/security/notices/USN-2736-1", "title": "Spice vulnerability", "type": "ubuntu", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:47:05", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5260", "CVE-2015-5261"], "description": "The Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a guest\ncould use this flaw to read and write arbitrary memory locations on the\nhost. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the \"surface_id\" parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or, possibly,\nexecute arbitrary code with the privileges of the host QEMU-KVM process.\n(CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains backported patches to correct these issues.\n", "modified": "2018-06-06T20:24:09", "published": "2015-10-12T04:00:00", "id": "RHSA-2015:1889", "href": "https://access.redhat.com/errata/RHSA-2015:1889", "type": "redhat", "title": "(RHSA-2015:1889) Important: spice-server security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:45", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5260", "CVE-2015-5261"], "description": "The Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a guest\ncould use this flaw to read and write arbitrary memory locations on the\nhost. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the \"surface_id\" parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or, possibly,\nexecute arbitrary code with the privileges of the host QEMU-KVM process.\n(CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.\n", "modified": "2018-04-12T03:33:13", "published": "2015-10-12T04:00:00", "id": "RHSA-2015:1890", "href": "https://access.redhat.com/errata/RHSA-2015:1890", "type": "redhat", "title": "(RHSA-2015:1890) Important: spice security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:47:05", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "The Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA race condition flaw, leading to a heap-based memory corruption, was found\nin spice's worker_update_monitors_config() function, which runs under the\nQEMU-KVM context on the host. A user in a guest could leverage this flaw to\ncrash the host QEMU-KVM process or, possibly, execute arbitrary code with\nthe privileges of the host QEMU-KVM process. (CVE-2015-3247)\n\nThis issue was discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains a backported patch to correct this issue.\n", "modified": "2018-06-06T20:24:09", "published": "2015-09-03T04:00:00", "id": "RHSA-2015:1715", "href": "https://access.redhat.com/errata/RHSA-2015:1715", "type": "redhat", "title": "(RHSA-2015:1715) Important: spice-server security update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:20", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "The Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA race condition flaw, leading to a heap-based memory corruption, was found\nin spice's worker_update_monitors_config() function, which runs under the\nQEMU-KVM context on the host. A user in a guest could leverage this flaw to\ncrash the host QEMU-KVM process or, possibly, execute arbitrary code with\nthe privileges of the host QEMU-KVM process. (CVE-2015-3247)\n\nThis issue was discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.\n", "modified": "2018-04-12T03:32:52", "published": "2015-09-03T04:00:00", "id": "RHSA-2015:1714", "href": "https://access.redhat.com/errata/RHSA-2015:1714", "type": "redhat", "title": "(RHSA-2015:1714) Important: spice security update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:30", "bulletinFamily": "unix", "cvelist": ["CVE-2014-8137", "CVE-2014-8138", "CVE-2015-1841", "CVE-2015-3247"], "description": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization \nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor \nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes \neverything necessary to run and manage virtual machines: A subset of the \nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise \nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for \nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA heap-based buffer overflow flaw was found in the way JasPer decoded JPEG\n2000 image files. A specially crafted file could cause an application using\nJasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8138)\n\nA race condition flaw, leading to a heap-based memory corruption, was found\nin spice's worker_update_monitors_config() function, which runs under the\nQEMU-KVM context on the host. A user in a guest could leverage this flaw to\ncrash the host QEMU-KVM process or, possibly, execute arbitrary code with\nthe privileges of the host QEMU-KVM process. (CVE-2015-3247)\n\nA double free flaw was found in the way JasPer parsed ICC color profiles in\nJPEG 2000 image files. A specially crafted file could cause an application\nusing JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8137)\n\nIt was found that the idle timeout in the Red Hat Enterprise Virtualization\nManager Web Admin interface failed to log out a session if a VM has been\nselected in the VM grid view. This could allow a local attacker to access\nthe web interface if it was left unattended. (CVE-2015-1841)\n\nRed Hat would like to thank oCERT for reporting CVE-2014-8137 and\nCVE-2014-8138. oCERT acknowledges Jose Duart of the Google Security Team as\nthe original reporter. The CVE-2015-3247 issue was discovered by Frediano\nZiglio of Red Hat. The CVE-2015-1841 issue was discovered by Einav Cohen\nof Red Hat.\n\nThis update also fixes the following bug:\n\n* Previously, installing the Red Hat Enterprise Virtualization Hypervisor 7\nRPM on a Red Hat Enterprise Linux 6 host failed, because no such thing was\navailable. Now, the Red Hat Enterprise Virtualization Hypervisor 7 RPM is\navailable in the rhel-6-server-rhevh-rpms channel, and can be installed on\na Red Hat Enterprise Linux 6 host. (BZ#1193678)\n\nIn addition, this update adds the following enhancement:\n\n* With this release, the Red Hat Enterprise Virtualizaton Hypervisor now\nincludes the drivers for the Dell Shared PERC8 RAID Controller.\n(BZ#1186582)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.\n", "modified": "2018-06-07T08:59:37", "published": "2015-09-03T04:00:00", "id": "RHSA-2015:1713", "href": "https://access.redhat.com/errata/RHSA-2015:1713", "type": "redhat", "title": "(RHSA-2015:1713) Important: rhev-hypervisor security, bug fix, and enhancement update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:26:55", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "**CentOS Errata and Security Advisory** CESA-2015:1889\n\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a guest\ncould use this flaw to read and write arbitrary memory locations on the\nhost. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the \"surface_id\" parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or, possibly,\nexecute arbitrary code with the privileges of the host QEMU-KVM process.\n(CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains backported patches to correct these issues.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-October/033466.html\n\n**Affected packages:**\nspice-server\nspice-server-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-1889.html", "edition": 3, "modified": "2015-10-12T23:26:07", "published": "2015-10-12T23:26:07", "href": "http://lists.centos.org/pipermail/centos-announce/2015-October/033466.html", "id": "CESA-2015:1889", "title": "spice security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:25:36", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "**CentOS Errata and Security Advisory** CESA-2015:1890\n\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA heap-based buffer overflow flaw was found in the way SPICE handled\ncertain guest QXL commands related to surface creation. A user in a guest\ncould use this flaw to read and write arbitrary memory locations on the\nhost. (CVE-2015-5261)\n\nA heap-based buffer overflow flaw was found in the way spice handled\ncertain QXL commands related to the \"surface_id\" parameter. A user in a\nguest could use this flaw to crash the host QEMU-KVM process or, possibly,\nexecute arbitrary code with the privileges of the host QEMU-KVM process.\n(CVE-2015-5260)\n\nThese issues were discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-October/033467.html\n\n**Affected packages:**\nspice\nspice-server\nspice-server-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-1890.html", "edition": 3, "modified": "2015-10-13T00:01:21", "published": "2015-10-13T00:01:21", "href": "http://lists.centos.org/pipermail/centos-announce/2015-October/033467.html", "id": "CESA-2015:1890", "title": "spice security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:27:00", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "**CentOS Errata and Security Advisory** CESA-2015:1714\n\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA race condition flaw, leading to a heap-based memory corruption, was found\nin spice's worker_update_monitors_config() function, which runs under the\nQEMU-KVM context on the host. A user in a guest could leverage this flaw to\ncrash the host QEMU-KVM process or, possibly, execute arbitrary code with\nthe privileges of the host QEMU-KVM process. (CVE-2015-3247)\n\nThis issue was discovered by Frediano Ziglio of Red Hat.\n\nAll spice users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-September/033413.html\n\n**Affected packages:**\nspice\nspice-server\nspice-server-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-1714.html", "edition": 3, "modified": "2015-09-03T19:28:10", "published": "2015-09-03T19:28:10", "href": "http://lists.centos.org/pipermail/centos-announce/2015-September/033413.html", "id": "CESA-2015:1714", "title": "spice security update", "type": "centos", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:27:16", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "**CentOS Errata and Security Advisory** CESA-2015:1715\n\n\nThe Simple Protocol for Independent Computing Environments (SPICE) is a\nremote display protocol for virtual environments. SPICE users can access a\nvirtualized desktop or server from the local system or any system with\nnetwork access to the server. SPICE is used in Red Hat Enterprise Linux for\nviewing virtualized guests running on the Kernel-based Virtual Machine\n(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.\n\nA race condition flaw, leading to a heap-based memory corruption, was found\nin spice's worker_update_monitors_config() function, which runs under the\nQEMU-KVM context on the host. A user in a guest could leverage this flaw to\ncrash the host QEMU-KVM process or, possibly, execute arbitrary code with\nthe privileges of the host QEMU-KVM process. (CVE-2015-3247)\n\nThis issue was discovered by Frediano Ziglio of Red Hat.\n\nAll spice-server users are advised to upgrade to this updated package,\nwhich contains a backported patch to correct this issue.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-September/033412.html\n\n**Affected packages:**\nspice-server\nspice-server-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-1715.html", "edition": 3, "modified": "2015-09-03T19:06:17", "published": "2015-09-03T19:06:17", "href": "http://lists.centos.org/pipermail/centos-announce/2015-September/033412.html", "id": "CESA-2015:1715", "title": "spice security update", "type": "centos", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-08-12T01:09:22", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2015-5260"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3371-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nOctober 09, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : spice\nCVE ID : CVE-2015-5260 CVE-2015-5261\nDebian Bug : 801089 801091\n\nFrediano Ziglio of Red Hat discovered several vulnerabilities in spice,\na SPICE protocol client and server library. A malicious guest can\nexploit these flaws to cause a denial of service (QEMU process crash),\nexecute arbitrary code on the host with the privileges of the hosting\nQEMU process or read and write arbitrary memory locations on the host.\n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 0.11.0-1+deb7u2.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 0.12.5-1+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.12.5-1.3.\n\nWe recommend that you upgrade your spice packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 9, "modified": "2015-10-09T18:22:55", "published": "2015-10-09T18:22:55", "id": "DEBIAN:DSA-3371-1:CE6F2", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00270.html", "title": "[SECURITY] [DSA 3371-1] spice security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-12T00:51:13", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3247"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3354-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nSeptember 08, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : spice\nCVE ID : CVE-2015-3247\nDebian Bug : 797976\n\nFrediano Ziglio of Red Hat discovered a race condition flaw in spice's\nworker_update_monitors_config() function, leading to a heap-based memory\ncorruption. A malicious user in a guest can take advantage of this flaw\nto cause a denial of service (QEMU process crash) or, potentially\nexecute arbitrary code on the host with the privileges of the hosting\nQEMU process.\n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 0.12.5-1+deb8u1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.12.5-1.2.\n\nWe recommend that you upgrade your spice packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2015-09-08T17:36:17", "published": "2015-09-08T17:36:17", "id": "DEBIAN:DSA-3354-1:A17F2", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00253.html", "title": "[SECURITY] [DSA 3354-1] spice security update", "type": "debian", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:47:06", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5261", "CVE-2016-0749", "CVE-2015-5260", "CVE-2016-2150"], "description": "### Background\n\nProvides a complete open source solution for remote access to virtual machines in a seamless way so you can play videos, record audio, share usb devices and share folders without complications. \n\n### Description\n\nMultiple vulnerabilities have been discovered in spice, please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code. Additionally, a local attacker could cause a Denial of Service. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll spice users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-emulation/spice-0.12.7-r1\"", "edition": 1, "modified": "2016-06-16T00:00:00", "published": "2016-06-16T00:00:00", "id": "GLSA-201606-05", "href": "https://security.gentoo.org/glsa/201606-05", "type": "gentoo", "title": "spice: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}