DSA-2839-1 spice -- denial of service

Related Vulnerabilities: CVE-2013-4130   CVE-2013-4282  

Multiple vulnerabilities have been found in spice, a SPICE protocol client and server library. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2013-4130 David Gibson of Red Hat discovered that SPICE incorrectly handled certain network errors. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application. CVE-2013-4282 Tomas Jamrisko of Red Hat discovered that SPICE incorrectly handled long passwords in SPICE tickets. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application. Applications acting as a SPICE server must be restarted for this update to take effect. For the stable distribution (wheezy), these problems have been fixed in version 0.11.0-1+deb7u1. For the testing distribution (jessie), these problems have been fixed in version 0.12.4-0nocelt2. For the unstable distribution (sid), these problems have been fixed in version 0.12.4-0nocelt2. We recommend that you upgrade your spice packages.

Debian Security Advisory

DSA-2839-1 spice -- denial of service

Date Reported:
08 Jan 2014
Affected Packages:
spice
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 717030, Bug 728314.
In Mitre's CVE dictionary: CVE-2013-4130, CVE-2013-4282.
More information:

Multiple vulnerabilities have been found in spice, a SPICE protocol client and server library. The Common Vulnerabilities and Exposures project identifies the following issues:

  • CVE-2013-4130

    David Gibson of Red Hat discovered that SPICE incorrectly handled certain network errors. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application.

  • CVE-2013-4282

    Tomas Jamrisko of Red Hat discovered that SPICE incorrectly handled long passwords in SPICE tickets. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application.

Applications acting as a SPICE server must be restarted for this update to take effect.

For the stable distribution (wheezy), these problems have been fixed in version 0.11.0-1+deb7u1.

For the testing distribution (jessie), these problems have been fixed in version 0.12.4-0nocelt2.

For the unstable distribution (sid), these problems have been fixed in version 0.12.4-0nocelt2.

We recommend that you upgrade your spice packages.