6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
68.9%
Severity: High
Date : 2017-08-14
CVE-ID : CVE-2017-7506
Package : spice
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-349
The package spice before version 0.12.8+8+ga957a90b-1 is vulnerable to
arbitrary code execution.
Upgrade to 0.12.8+8+ga957a90b-1.
The problem has been fixed upstream but no release is available yet.
None.
Two security issues have been found in spice <= 0.12.8, allowing a
remote, authenticated user to get access to memory content by sending a
number of monitors bigger than the number of items, and to trigger an
integer overflow of the buffer_size variable, leading to a potentially
exploitable buffer overflow.
A remote, authenticated attacker can access sensitive information or
execute arbitrary code on the affected host.
https://bugs.archlinux.org/task/54808
https://bugzilla.redhat.com/show_bug.cgi?id=1452606
https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=f1e7ec03e26ab6b8ca9b7ec060846a5b706a963d
https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=ec6229c79abe05d731953df5f7e9a05ec9f6df79
https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=a957a90baf2c62d31f3547e56bba7d0e812d2331
https://security.archlinux.org/CVE-2017-7506
bugs.archlinux.org/task/54808
bugzilla.redhat.com/show_bug.cgi?id=1452606
cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=a957a90baf2c62d31f3547e56bba7d0e812d2331
cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=ec6229c79abe05d731953df5f7e9a05ec9f6df79
cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=f1e7ec03e26ab6b8ca9b7ec060846a5b706a963d
security.archlinux.org/AVG-349
security.archlinux.org/CVE-2017-7506
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
68.9%