Search for packages
purl | pkg:deb/ubuntu/spice@0.12.4-0nocelt2ubuntu1.5 |
Next non-vulnerable version | 0.12.4-0nocelt2ubuntu1.8 |
Latest non-vulnerable version | 0.12.4-0nocelt2ubuntu1.8 |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-afzs-1b88-aaaf
Aliases: CVE-2018-10873 |
A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts. |
Affected by 1 other vulnerability. |
VCID-q6fk-hm76-aaaf
Aliases: CVE-2017-12194 |
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. |
Affected by 2 other vulnerabilities. |
VCID-usmx-bw7t-aaan
Aliases: CVE-2019-3813 |
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-stbg-r14q-aaap | spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak. |
CVE-2017-7506
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|