Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
13 Feb 2023, 00:52
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter. |
02 Feb 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
Summary | A heap-based buffer overflow flaw was found in the way spice handled certain QXL commands related to the "surface_id" parameter. A user in a guest could use this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. | |
References |
|
Information
Published : 2016-06-07 14:06
Updated : 2023-12-10 11:46
NVD link : CVE-2015-5260
Mitre link : CVE-2015-5260
CVE.ORG link : CVE-2015-5260
JSON object : View
Products Affected
redhat
- enterprise_linux_hpc_node
- enterprise_linux_server_eus
- enterprise_linux_workstation
- enterprise_linux_hpc_node_eus
- enterprise_linux_server
- enterprise_linux_desktop
spice_project
- spice
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer