5.4 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:M/Au:N/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
69.8%
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
CPE | Name | Operator | Version |
---|---|---|---|
spice_project:spice | spice project spice | le | 0.14.1 |
[
{
"product": "Spice",
"vendor": "Red Hat, Inc.",
"versions": [
{
"status": "affected",
"version": "versions 0.5.2 through 0.14.1"
}
]
}
]
www.securityfocus.com/bid/106801
access.redhat.com/errata/RHSA-2019:0231
access.redhat.com/errata/RHSA-2019:0232
access.redhat.com/errata/RHSA-2019:0457
bugzilla.redhat.com/show_bug.cgi?id=1665371
lists.debian.org/debian-lts-announce/2019/01/msg00026.html
security.gentoo.org/glsa/202007-30
usn.ubuntu.com/3870-1/
www.debian.org/security/2019/dsa-4375
5.4 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:M/Au:N/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
69.8%