The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
12 Feb 2023, 23:16
Type | Values Removed | Values Added |
---|---|---|
Summary | The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow. | |
References |
|
02 Feb 2023, 21:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. |
Information
Published : 2016-06-09 16:59
Updated : 2023-12-10 11:46
NVD link : CVE-2016-0749
Mitre link : CVE-2016-0749
CVE.ORG link : CVE-2016-0749
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_hpc_node_eus
- enterprise_linux_workstation
- enterprise_linux_desktop
opensuse
- opensuse
- leap
microsoft
- windows
spice_project
- spice
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer