CVE-2017-7506

spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:spice_project:spice:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.2:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.3:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.4:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.5:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.6:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.7:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.12.8:*:*:*:*:*:*:*
cpe:2.3:a:spice_project:spice:0.13.0:*:*:*:*:*:*:*

History

12 Feb 2023, 23:30

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2017-7506', 'name': 'https://access.redhat.com/security/cve/CVE-2017-7506', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHBA-2017:2529', 'name': 'https://access.redhat.com/errata/RHBA-2017:2529', 'tags': [], 'refsource': 'MISC'}
Summary A vulnerability was discovered in spice server's protocol handling. An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash. spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.

02 Feb 2023, 21:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2017-7506 -
  • (MISC) https://access.redhat.com/errata/RHBA-2017:2529 -
Summary spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak. A vulnerability was discovered in spice server's protocol handling. An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash.

Information

Published : 2017-07-18 15:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-7506

Mitre link : CVE-2017-7506

CVE.ORG link : CVE-2017-7506


JSON object : View

Products Affected

spice_project

  • spice
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer