Lucene search

K
mageiaGentoo FoundationMGASA-2014-0022
HistoryJan 21, 2014 - 8:20 p.m.

Updated spice packages fix a security vulnerability

2014-01-2120:20:58
Gentoo Foundation
advisories.mageia.org
22

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.084

Percentile

94.5%

Updated spice packages fix security vulnerability: A stack-based buffer overflow flaw was found in the way the reds_handle_ticket() function in the spice-server library handled decryption of ticket data provided by the client. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application (CVE-2013-4282).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchspice<Β 0.12.2-5.2spice-0.12.2-5.2.mga3

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.084

Percentile

94.5%