The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE prior to 0.12.4 do not properly perform ring loops, which might allow remote malicious users to cause a denial of service (reachable assertion and server exit) by triggering a network error.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
spice project spice 0.12.0 |
||
spice project spice 0.11.3 |
||
spice project spice 0.8.2 |
||
spice project spice 0.8.1 |
||
spice project spice 0.7.0 |
||
spice project spice 0.6.1 |
||
spice project spice 0.11.0 |
||
spice project spice 0.10.1 |
||
spice project spice 0.8.0 |
||
spice project spice 0.6.4 |
||
spice project spice 0.6.3 |
||
spice project spice 0.6.0 |
||
spice project spice 0.5.3 |
||
spice project spice |
||
spice project spice 0.12.2 |
||
spice project spice 0.9.1 |
||
spice project spice 0.9.0 |
||
spice project spice 0.7.2 |
||
spice project spice 0.7.1 |
||
spice project spice 0.10.0 |
||
spice project spice 0.8.3 |
||
spice project spice 0.6.2 |
||
spice project spice 0.7.3 |
||
spice project spice 0.5.2 |
||
canonical ubuntu linux 13.04 |