10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
0.037 Low
EPSS
Percentile
91.8%
Jing Zhao discovered that the Spice smartcard support incorrectly handled
memory. A remote attacker could use this issue to cause Spice to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only applied to Ubuntu 15.10 and Ubuntu 16.04 LTS. (CVE-2016-0749)
Frediano Ziglio discovered that Spice incorrectly handled certain primary
surface parameters. A malicious guest operating system could potentially
exploit this issue to escape virtualization. (CVE-2016-2150)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | libspice-server1 | < 0.12.6-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libspice-server-dev | < 0.12.6-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libspice-server-dev-dbgsym | < 0.12.6-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libspice-server1-dbg | < 0.12.6-4ubuntu0.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libspice-server1-dbgsym | < 0.12.6-4ubuntu0.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libspice-server1 | < 0.12.5-1.1ubuntu2.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libspice-server-dev | < 0.12.5-1.1ubuntu2.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libspice-server-dev-dbgsym | < 0.12.5-1.1ubuntu2.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libspice-server1-dbg | < 0.12.5-1.1ubuntu2.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libspice-server1-dbgsym | < 0.12.5-1.1ubuntu2.1 | UNKNOWN |
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
0.037 Low
EPSS
Percentile
91.8%