[arch-security] [ASA-201708-12] spice: arbitrary code execution
rgacogne at archlinux.org
Tue Aug 15 09:24:21 UTC 2017
Arch Linux Security Advisory ASA-201708-12
Date : 2017-08-14
CVE-ID : CVE-2017-7506
Package : spice
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-349
The package spice before version 0.12.8+8+ga957a90b-1 is vulnerable to
arbitrary code execution.
Upgrade to 0.12.8+8+ga957a90b-1.
# pacman -Syu "spice>=0.12.8+8+ga957a90b-1"
The problem has been fixed upstream but no release is available yet.
Two security issues have been found in spice <= 0.12.8, allowing a
remote, authenticated user to get access to memory content by sending a
number of monitors bigger than the number of items, and to trigger an
integer overflow of the buffer_size variable, leading to a potentially
exploitable buffer overflow.
A remote, authenticated attacker can access sensitive information or
execute arbitrary code on the affected host.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security