CVE-2017-12194
https://notcve.org/view.php?id=CVE-2017-12194
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. >Se ha encontrado un error en la forma en la que spice-client procesaba ciertos mensajes enviados desde el servidor. Un atacante con control del spice-server malicioso podría emplear este error para cerrar inesperadamente el cliente o ejecutar código arbitrario con los permisos del usuario que está ejecutando el cliente. Se cree que las versiones de spice-gtk hasta la 0.34 son vulnerables. • http://www.securityfocus.com/bid/103413 https://bugzilla.redhat.com/show_bug.cgi?id=1501200 https://security.gentoo.org/glsa/201811-20 https://usn.ubuntu.com/3659-1 • CWE-20: Improper Input Validation CWE-121: Stack-based Buffer Overflow •
CVE-2017-7506 – spice: Possible buffer overflow via invalid monitor configurations
https://notcve.org/view.php?id=CVE-2017-7506
spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak. Spice versiones hasta 0.13, son vulnerables al acceso a la memoria fuera de límites al procesar mensajes especialmente creados desde el atacante autenticado hasta el servidor de Spice, resultando en un bloqueo y/o pérdida de memoria del servidor. A vulnerability was discovered in spice server's protocol handling. An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash. • http://www.debian.org/security/2017/dsa-3907 http://www.openwall.com/lists/oss-security/2017/07/14/1 http://www.securityfocus.com/bid/99583 https://access.redhat.com/errata/RHSA-2017:2471 https://access.redhat.com/errata/RHSA-2018:3522 https://bugzilla.redhat.com/show_bug.cgi?id=1452606 https://access.redhat.com/security/cve/CVE-2017-7506 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-3066
https://notcve.org/view.php?id=CVE-2016-3066
The spice-gtk widget allows remote authenticated users to obtain information from the host clipboard. El widget spice-gtk permite a los usuarios autorizados obtener de forma remota información del portapapeles del host. • https://bugzilla.redhat.com/show_bug.cgi?id=1320263 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2016-9578 – spice: Remote DoS via crafted message
https://notcve.org/view.php?id=CVE-2016-9578
A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash. Se ha descubierto una vulnerabilidad en SPICE en versiones anteriores a la 0.13.90 en el manejo del protocolo del servidor. Un atacante capaz de conectarse al servidor de SPICE podría enviar mensajes manipulados que podría provocar el cierre inesperado del proceso. A vulnerability was discovered in SPICE in the server's protocol handling. • http://rhn.redhat.com/errata/RHSA-2017-0253.html http://rhn.redhat.com/errata/RHSA-2017-0549.html http://www.securityfocus.com/bid/96118 https://access.redhat.com/errata/RHSA-2017:0254 https://access.redhat.com/errata/RHSA-2017:0552 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9578 https://www.debian.org/security/2017/dsa-3790 https://access.redhat.com/security/cve/CVE-2016-9578 https://bugzilla.redhat.com/show_bug.cgi?id=1399566 • CWE-20: Improper Input Validation CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2016-9577 – spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages
https://notcve.org/view.php?id=CVE-2016-9577
A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution. Se ha descubierto una vulnerabilidad en SPICE en versiones anteriores a la 0.13.90 en el manejo del protocolo del servidor. Un atacante autenticado podría enviar mensajes al servidor SPICE provocando un desbordamiento de memoria dinámica (heap) que provocaría un cierre inesperado o una posible ejecución de código. A vulnerability was discovered in SPICE in the server's protocol handling. • http://rhn.redhat.com/errata/RHSA-2017-0253.html http://rhn.redhat.com/errata/RHSA-2017-0549.html http://www.securityfocus.com/bid/96040 https://access.redhat.com/errata/RHSA-2017:0254 https://access.redhat.com/errata/RHSA-2017:0552 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577 https://www.debian.org/security/2017/dsa-3790 https://access.redhat.com/security/cve/CVE-2016-9577 https://bugzilla.redhat.com/show_bug.cgi?id=1401603 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •