The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4130 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 4.3 |
---|---|
Base Metrics | AV:A/AC:H/Au:S/C:N/I:N/A:C |
Access Vector | Adjacent Network |
Access Complexity | High |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (spice-server) | RHSA-2013:1192 | 2013-09-03 |
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) | RHSA-2013:1260 | 2013-09-23 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | spice | Not affected |
Red Hat Enterprise Linux 5 | qspice | Not affected |