Lucene search

K
osvGoogleOSV:DSA-2839-1
HistoryJan 08, 2014 - 12:00 a.m.

spice - denial of service

2014-01-0800:00:00
Google
osv.dev
6

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.072 Low

EPSS

Percentile

93.0%

Multiple vulnerabilities have been found in spice, a SPICE protocol
client and server library. The Common Vulnerabilities and Exposures
project identifies the following issues:

  • CVE-2013-4130
    David Gibson of Red Hat discovered that SPICE incorrectly handled
    certain network errors. A remote user able to initiate a SPICE
    connection to an application acting as a SPICE server could use this
    flaw to crash the application.
  • CVE-2013-4282
    Tomas Jamrisko of Red Hat discovered that SPICE incorrectly handled
    long passwords in SPICE tickets. A remote user able to initiate a
    SPICE connection to an application acting as a SPICE server could use
    this flaw to crash the application.

Applications acting as a SPICE server must be restarted for this update
to take effect.

For the stable distribution (wheezy), these problems have been fixed in
version 0.11.0-1+deb7u1.

For the testing distribution (jessie), these problems have been fixed in
version 0.12.4-0nocelt2.

For the unstable distribution (sid), these problems have been fixed in
version 0.12.4-0nocelt2.

We recommend that you upgrade your spice packages.

CPENameOperatorVersion
spiceeq0.11.0-1

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.072 Low

EPSS

Percentile

93.0%