A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
Vector
NETWORK
Complexity
LOW
Authentication
SINGLE_INSTANCE
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL
Canonical Ubuntu linux 16.04 ~~lts~~~ (not an official CPE)
Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
Canonical Ubuntu linux 18.04 ~~lts~~~ (not an official CPE)
Debian Linux 8.0 (Jessie)
Debian Debian linux 9.0 (not an official CPE)
Redhat Enterprise linux desktop 6.0 (not an official CPE)
Redhat Enterprise linux desktop 7.0 (not an official CPE)
Redhat Enterprise linux server 6.0 (not an official CPE)
Redhat Enterprise linux server 7.0 (not an official CPE)
Redhat Enterprise linux server aus 7.6 (not an official CPE)
Redhat Enterprise linux server eus 7.5 (not an official CPE)
Redhat Enterprise linux server eus 7.6 (not an official CPE)
Redhat Enterprise linux server tus 7.6 (not an official CPE)
Redhat Enterprise linux workstation 6.0 (not an official CPE)
Redhat Enterprise linux workstation 7.0 (not an official CPE)
Spice project Spice 0.14.0 (not an official CPE)
Spice project Spice 0.13.91 (not an official CPE)
Spice project Spice 0.13.90 (not an official CPE)
Spice project Spice 0.13.3 (not an official CPE)
Spice project Spice 0.13.2 (not an official CPE)
Spice project Spice 0.13.1 (not an official CPE)
Spice project Spice 0.13.0 (not an official CPE)
Spice project Spice 0.12.8 (not an official CPE)
Spice project Spice 0.12.7 (not an official CPE)
Spice project Spice 0.12.6 (not an official CPE)
Spice project Spice 0.12.5 (not an official CPE)
Spice Project SPICE 0.12.4
Spice Project SPICE 0.12.3
Spice Project SPICE 0.12.2
Spice Project SPICE 0.12.0
Spice Project SPICE 0.11.3
Spice Project SPICE 0.11.0
Spice Project SPICE 0.10.1
Spice Project SPICE 0.10.0
Spice Project SPICE 0.9.1
Spice Project SPICE 0.9.0
Spice Project SPICE 0.8.3
Spice Project SPICE 0.8.2
Spice Project SPICE 0.8.1
Spice Project SPICE 0.8.0
Spice Project SPICE 0.7.3
Spice Project SPICE 0.7.2
Spice Project SPICE 0.7.1
Spice Project SPICE 0.7.0
Spice Project SPICE 0.6.4
Spice Project SPICE 0.6.3
Spice Project SPICE 0.6.2
Spice Project SPICE 0.6.1
Spice Project SPICE 0.6.0
Spice Project SPICE 0.5.3
Spice Project SPICE 0.5.2
Redhat Virtualization host 4.0 (not an official CPE)
Redhat Virtualization 4.0 (not an official CPE)
Canonical - Ubuntu linux
Spice project - Spice
Redhat - Virtualization host
Redhat - Virtualization
Debian - Debian linux
Redhat - Enterprise linux desktop
Redhat - Enterprise linux server
Redhat - Enterprise linux server aus
Redhat - Enterprise linux server eus
Redhat - Enterprise linux server tus
Redhat - Enterprise linux workstation
Improper Input Validation (ID 20)
Related CAPEC 58
Buffer Overflow via Environment Variables (CAPEC-ID 10)
Server Side Include (SSI) Injection (CAPEC-ID 101)
Cross Zone Scripting (CAPEC-ID 104)
Cross Site Scripting through Log Files (CAPEC-ID 106)
Command Line Execution through SQL Injection (CAPEC-ID 108)
Object Relational Mapping Injection (CAPEC-ID 109)
SQL Injection through SOAP Parameter Tampering (CAPEC-ID 110)
Subverting Environment Variable Values (CAPEC-ID 13)
Format String Injection (CAPEC-ID 135)
LDAP Injection (CAPEC-ID 136)
Relative Path Traversal (CAPEC-ID 139)
Client-side Injection-induced Buffer Overflow (CAPEC-ID 14)
Variable Manipulation (CAPEC-ID 171)
Embedding Scripts in Non-Script Elements (CAPEC-ID 18)
Flash Injection (CAPEC-ID 182)
Cross-Site Scripting Using Alternate Syntax (CAPEC-ID 199)
Exploiting Trust in Client (aka Make the Client Invisible) (CAPEC-ID 22)
XML Nested Payloads (CAPEC-ID 230)
XML Oversized Payloads (CAPEC-ID 231)
Filter Failure through Buffer Overflow (CAPEC-ID 24)
Cross-Site Scripting via Encoded URI Schemes (CAPEC-ID 244)
XML Injection (CAPEC-ID 250)
Environment Variable Manipulation (CAPEC-ID 264)
Global variable manipulation (CAPEC-ID 265)
Leverage Alternate Encoding (CAPEC-ID 267)
Fuzzing (CAPEC-ID 28)
Using Leading 'Ghost' Character Sequences to Bypass Input Filters (CAPEC-ID 3)
Accessing/Intercepting/Modifying HTTP Cookies (CAPEC-ID 31)
Embedding Scripts in HTTP Query Strings (CAPEC-ID 32)
MIME Conversion (CAPEC-ID 42)
Exploiting Multiple Input Interpretation Layers (CAPEC-ID 43)
Buffer Overflow via Symbolic Links (CAPEC-ID 45)
Overflow Variables and Tags (CAPEC-ID 46)
Buffer Overflow via Parameter Expansion (CAPEC-ID 47)
Signature Spoof (CAPEC-ID 473)
XML Client-Side Attack (CAPEC-ID 484)
Embedding NULL Bytes (CAPEC-ID 52)
Postfix, Null Terminate, and Backslash (CAPEC-ID 53)
Simple Script Injection (CAPEC-ID 63)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
SQL Injection (CAPEC-ID 66)
String Format Overflow in syslog() (CAPEC-ID 67)
Blind SQL Injection (CAPEC-ID 7)
Using Unicode Encoding to Bypass Validation Logic (CAPEC-ID 71)
URL Encoding (CAPEC-ID 72)
User-Controlled Filename (CAPEC-ID 73)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)
Buffer Overflow in an API Call (CAPEC-ID 8)
Using UTF-8 Encoding to Bypass Validation Logic (CAPEC-ID 80)
Web Logs Tampering (CAPEC-ID 81)
XPath Injection (CAPEC-ID 83)
AJAX Fingerprinting (CAPEC-ID 85)
Embedding Script (XSS) in HTTP Headers (CAPEC-ID 86)
OS Command Injection (CAPEC-ID 88)
Buffer Overflow in Local Command-Line Utilities (CAPEC-ID 9)
XSS in IMG Tags (CAPEC-ID 91)
XML Parser Attack (CAPEC-ID 99)