Spice Project

Spice

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.15%
  • Veröffentlicht 28.05.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 05:46:07

A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.

  • EPSS 1.63%
  • Veröffentlicht 07.10.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:04

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious ...

  • EPSS 0.26%
  • Veröffentlicht 04.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:35

Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.

  • EPSS 0.35%
  • Veröffentlicht 11.09.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:14

Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.

  • EPSS 1.27%
  • Veröffentlicht 17.08.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:11

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its p...

  • EPSS 3.47%
  • Veröffentlicht 27.07.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:25

A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.

  • EPSS 3.86%
  • Veröffentlicht 27.07.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:25

A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.

  • EPSS 1.58%
  • Veröffentlicht 18.07.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.

  • EPSS 0.07%
  • Veröffentlicht 09.06.2016 16:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.

  • EPSS 16.15%
  • Veröffentlicht 09.06.2016 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.