SB2015090807 - Buffer overflow in SPICE
Published: September 8, 2015 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2015-3247)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
Remediation
Install update from vendor's website.
References
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1713.html
- http://rhn.redhat.com/errata/RHSA-2015-1714.html
- http://rhn.redhat.com/errata/RHSA-2015-1715.html
- http://www.debian.org/security/2015/dsa-3354
- http://www.securitytracker.com/id/1033459
- http://www.securitytracker.com/id/1033460
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2736-1