spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3907 | |
http://www.openwall.com/lists/oss-security/2017/07/14/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/99583 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:2471 | |
https://access.redhat.com/errata/RHSA-2018:3522 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1452606 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-07-18 15:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-7506
Mitre link : CVE-2017-7506
CVE.ORG link : CVE-2017-7506
JSON object : View
Products Affected
spice_project
- spice
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer