CVE-2019-3813
Published: 28 January 2019
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
Notes
Author | Note |
---|---|
leosilva | Issues that touch python_modules for spice in Xenial need to be addressed in spice-protocol. |
Priority
Status
Package | Release | Status |
---|---|---|
spice-gtk Launchpad, Ubuntu, Debian |
upstream |
Not vulnerable
(code not present)
|
trusty |
Does not exist
(trusty was not-affected [code not present])
|
|
xenial |
Not vulnerable
(code not present)
|
|
bionic |
Not vulnerable
(code not present)
|
|
cosmic |
Not vulnerable
(code not present)
|
|
spice Launchpad, Ubuntu, Debian |
upstream |
Pending
(0.14.2)
|
trusty |
Released
(0.12.4-0nocelt2ubuntu1.8)
|
|
xenial |
Released
(0.12.6-4ubuntu0.4)
|
|
bionic |
Released
(0.14.0-1ubuntu2.4)
|
|
cosmic |
Released
(0.14.0-1ubuntu4.2)
|
|
spice-protocol Launchpad, Ubuntu, Debian |
upstream |
Not vulnerable
(code not present)
|
trusty |
Does not exist
(trusty was not-affected [code not present])
|
|
xenial |
Not vulnerable
(code not present)
|
|
bionic |
Not vulnerable
(code not present)
|
|
cosmic |
Not vulnerable
(code not present)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Adjacent |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |