[arch-security] [ASA-201708-12] spice: arbitrary code execution

Remi Gacogne rgacogne at archlinux.org
Tue Aug 15 09:24:21 UTC 2017


Arch Linux Security Advisory ASA-201708-12
==========================================

Severity: High
Date    : 2017-08-14
CVE-ID  : CVE-2017-7506
Package : spice
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-349

Summary
=======

The package spice before version 0.12.8+8+ga957a90b-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 0.12.8+8+ga957a90b-1.

# pacman -Syu "spice>=0.12.8+8+ga957a90b-1"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

Two security issues have been found in spice <= 0.12.8, allowing a
remote, authenticated user to get access to memory content by sending a
number of monitors bigger than the number of items, and to trigger an
integer overflow of the buffer_size variable, leading to a potentially
exploitable buffer overflow.

Impact
======

A remote, authenticated attacker can access sensitive information or
execute arbitrary code on the affected host.

References
==========

https://bugs.archlinux.org/task/54808
https://bugzilla.redhat.com/show_bug.cgi?id=1452606
https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=f1e7ec03e26ab6b8ca9b7ec060846a5b706a963d
https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=ec6229c79abe05d731953df5f7e9a05ec9f6df79
https://cgit.freedesktop.org/spice/spice/commit/?h=0.12&id=a957a90baf2c62d31f3547e56bba7d0e812d2331
https://security.archlinux.org/CVE-2017-7506

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170815/0fb17518/attachment.asc>


More information about the arch-security mailing list