Summary
Multiple vulnerabilities have been found in spice, a SPICE protocol client and server library. The Common Vulnerabilities and Exposures project identifies the following issues:
CVE-2013-4130
David Gibson of Red Hat discovered that SPICE incorrectly handled certain network errors. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application.
CVE-2013-4282
Tomas Jamrisko of Red Hat discovered that SPICE incorrectly handled long passwords in SPICE tickets. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application.
Applications acting as a SPICE server must be restarted for this update to take effect.
Solution
For the stable distribution (wheezy), these problems have been fixed in version 0.11.0-1+deb7u1.
For the testing distribution (jessie), these problems have been fixed in version 0.12.4-0nocelt2.
For the unstable distribution (sid), these problems have been fixed in version 0.12.4-0nocelt2.
We recommend that you upgrade your spice packages.
Affected
spice on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4130, CVE-2013-4282 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities