Executive Summary
Summary | |
---|---|
Title | spice-server security update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:1192 | First vendor Publication | 2013-09-03 |
Vendor | RedHat | Last vendor Modification | 2013-09-03 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated spice-server package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A flaw was found in the way concurrent access to the clients ring buffer was performed in the spice-server library. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application. (CVE-2013-4130) This issue was discovered by David Gibson of Red Hat. Users of spice-server are advised to upgrade to this updated package, which contains a backported patch to correct this issue. Applications acting as a SPICE server must be restarted for this update to take effect. Note that QEMU-KVM guests providing SPICE console access must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 984769 - CVE-2013-4130 spice: unsafe clients ring access abort |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-1192.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18370 | |||
Oval ID: | oval:org.mitre.oval:def:18370 | ||
Title: | USN-1926-1 -- spice vulnerability | ||
Description: | SPICE could be made to crash if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1926-1 CVE-2013-4130 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | spice |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21175 | |||
Oval ID: | oval:org.mitre.oval:def:21175 | ||
Title: | RHSA-2013:1192: spice-server security update (Moderate) | ||
Description: | The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:1192-00 CESA-2013:1192 CVE-2013-4130 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | spice-server |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23198 | |||
Oval ID: | oval:org.mitre.oval:def:23198 | ||
Title: | ELSA-2013:1192: spice-server security update (Moderate) | ||
Description: | The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:1192-00 CVE-2013-4130 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | spice-server |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27055 | |||
Oval ID: | oval:org.mitre.oval:def:27055 | ||
Title: | DEPRECATED: ELSA-2013-1192 -- spice-server security update (moderate) | ||
Description: | [0.12.0-12.el6_4.3] - Fixes an abort on unsafe client ring access Resolves: rhbz#986298 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1192 CVE-2013-4130 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | spice-server |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1260.nasl - Type : ACT_GATHER_INFO |
2014-01-09 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2839.nasl - Type : ACT_GATHER_INFO |
2013-09-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1192.nasl - Type : ACT_GATHER_INFO |
2013-09-05 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130903_spice_server_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1192.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1192.nasl - Type : ACT_GATHER_INFO |
2013-08-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-217.nasl - Type : ACT_GATHER_INFO |
2013-08-15 | Name : The remote Fedora host is missing a security update. File : fedora_2013-14362.nasl - Type : ACT_GATHER_INFO |
2013-08-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1926-1.nasl - Type : ACT_GATHER_INFO |
2013-08-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-14110.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:57:24 |
|
2013-09-04 00:21:38 |
|