Stack-based buffer overflow in SPICE - CVE-2013-4282
Published: November 2, 2013 / Updated: August 3, 2020
SPICE
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the reds_handle_ticket function in server/reds.c when processing a long password in a SPICE ticket. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2013-4282
Sources
- http://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://rhn.redhat.com/errata/RHSA-2013-1473.html
- http://rhn.redhat.com/errata/RHSA-2013-1474.html
- http://www.debian.org/security/2014/dsa-2839
- http://www.securityfocus.com/bid/63408
- http://www.ubuntu.com/usn/USN-2027-1