CNVD-2017-01269

Vulnerability from cnvd - Published: 2017-02-14
VLAI Severity ?
Title
Spice缓冲区溢出漏洞
Description
SPICE (Simple Protocol for Independent Computing Environment) 是Red Hat收购Qumranet后获得虚拟技术。SPICE能用于在服务器和远程计算机如桌面和瘦客户端设备上部署虚拟桌面 Spice存在缓冲区溢出漏洞,由于将用户数据复制到大小不足的内存缓冲区时未能做充分验证。攻击者可以利用该漏洞在受影响的应用程序环境中执行任意代码,失败的攻击会造成拒绝服务。
Severity
Patch Name
Spice缓冲区溢出漏洞的补丁
Patch Description
SPICE (Simple Protocol for Independent Computing Environment) 是Red Hat收购Qumranet后获得虚拟技术。SPICE能用于在服务器和远程计算机如桌面和瘦客户端设备上部署虚拟桌面 Spice存在缓冲区溢出漏洞,由于将用户数据复制到大小不足的内存缓冲区时未能做充分验证。攻击者可以利用该漏洞在受影响的应用程序环境中执行任意代码,失败的攻击会造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://bugzilla.redhat.com/show_bug.cgi?id=1401603

Reference
http://www.securityfocus.com/bid/96040
Impacted products
Name
['Red Hat Spice 0.12.3', 'Red Hat Spice 0.12.2', 'Red Hat Spice 0.12', 'Red Hat Spice 0.11.3', 'Red Hat Spice 0.9.0', 'Red Hat Spice 0.11.0', 'Red Hat Spice 0.10.1', 'Red Hat Spice 0.10.0']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "96040"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-9577"
    }
  },
  "description": "SPICE (Simple Protocol for Independent Computing Environment) \u662fRed Hat\u6536\u8d2dQumranet\u540e\u83b7\u5f97\u865a\u62df\u6280\u672f\u3002SPICE\u80fd\u7528\u4e8e\u5728\u670d\u52a1\u5668\u548c\u8fdc\u7a0b\u8ba1\u7b97\u673a\u5982\u684c\u9762\u548c\u7626\u5ba2\u6237\u7aef\u8bbe\u5907\u4e0a\u90e8\u7f72\u865a\u62df\u684c\u9762\r\n\r\nSpice\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u7531\u4e8e\u5c06\u7528\u6237\u6570\u636e\u590d\u5236\u5230\u5927\u5c0f\u4e0d\u8db3\u7684\u5185\u5b58\u7f13\u51b2\u533a\u65f6\u672a\u80fd\u505a\u5145\u5206\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u73af\u5883\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u5931\u8d25\u7684\u653b\u51fb\u4f1a\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Frediano Ziglio (Red Hat)",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1401603",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-01269",
  "openTime": "2017-02-14",
  "patchDescription": "SPICE (Simple Protocol for Independent Computing Environment) \u662fRed Hat\u6536\u8d2dQumranet\u540e\u83b7\u5f97\u865a\u62df\u6280\u672f\u3002SPICE\u80fd\u7528\u4e8e\u5728\u670d\u52a1\u5668\u548c\u8fdc\u7a0b\u8ba1\u7b97\u673a\u5982\u684c\u9762\u548c\u7626\u5ba2\u6237\u7aef\u8bbe\u5907\u4e0a\u90e8\u7f72\u865a\u62df\u684c\u9762\r\n\r\nSpice\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u7531\u4e8e\u5c06\u7528\u6237\u6570\u636e\u590d\u5236\u5230\u5927\u5c0f\u4e0d\u8db3\u7684\u5185\u5b58\u7f13\u51b2\u533a\u65f6\u672a\u80fd\u505a\u5145\u5206\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u73af\u5883\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u5931\u8d25\u7684\u653b\u51fb\u4f1a\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Spice\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Red Hat Spice 0.12.3",
      "Red Hat Spice  0.12.2",
      "Red Hat Spice  0.12",
      "Red Hat Spice  0.11.3",
      "Red Hat Spice  0.9.0",
      "Red Hat Spice  0.11.0",
      "Red Hat Spice  0.10.1",
      "Red Hat Spice  0.10.0"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/96040",
  "serverity": "\u9ad8",
  "submitTime": "2017-02-07",
  "title": "Spice\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…