Executive Summary
Summary | |
---|---|
Title | qspice-client security update |
Informations | |||
---|---|---|---|
Name | RHSA-2010:0632 | First vendor Publication | 2010-08-25 |
Vendor | RedHat | Last vendor Modification | 2010-08-25 |
Severity (Vendor) | Moderate | Revision | 03 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 3.3 | Attack Range | Local |
Cvss Impact Score | 4.9 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated qspice-client package that fixes one security issue is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor, or on Red Hat Enterprise Virtualization Hypervisor. The qspice-client package provides the client side of the SPICE protocol. A race condition was found in the way the SPICE Mozilla Firefox plug-in and the SPICE client communicated. A local attacker could use this flaw to trick the plug-in and the SPICE client into communicating over an attacker-controlled socket, possibly gaining access to authentication details, or resulting in a man-in-the-middle attack on the SPICE connection. (CVE-2010-2792) Users of qspice-client should upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 620350 - CVE-2010-2792 spice-xpi/qspice-client unix socket race |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2010-0632.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-362 | Race Condition |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:22291 | |||
Oval ID: | oval:org.mitre.oval:def:22291 | ||
Title: | RHSA-2010:0632: qspice-client security update (Moderate) | ||
Description: | Race condition in the SPICE (aka spice-xpi) plug-in 2.2 for Firefox allows local users to obtain sensitive information, and conduct man-in-the-middle attacks, by providing a UNIX socket for communication between this plug-in and the client (aka qspice-client) in qspice 0.3.0, and then accessing this socket. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0632-03 CESA-2010:0632 CVE-2010-2792 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | qspice-client |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22960 | |||
Oval ID: | oval:org.mitre.oval:def:22960 | ||
Title: | ELSA-2010:0632: qspice-client security update (Moderate) | ||
Description: | Race condition in the SPICE (aka spice-xpi) plug-in 2.2 for Firefox allows local users to obtain sensitive information, and conduct man-in-the-middle attacks, by providing a UNIX socket for communication between this plug-in and the client (aka qspice-client) in qspice 0.3.0, and then accessing this socket. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0632-03 CVE-2010-2792 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | qspice-client |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
67619 | SPICE Plugin for Firefox Socket Hijacking Local Information Disclosure |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0632.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0651.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20100825_qspice_client_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20100825_spice_xpi_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2010-08-26 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0632.nasl - Type : ACT_GATHER_INFO |
2010-08-26 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0651.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:53:45 |
|