7.8
CVSSv3

CVE-2015-5260

Published: 07/06/2016 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in SPICE prior to 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux server eus 6.7.z

redhat enterprise linux hpc node 6.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

debian debian linux 8.0

debian debian linux 7.0

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

spice project spice

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server eus 7.1

redhat enterprise linux hpc node eus 7.1

Vendor Advisories

Spice could be made to crash or run programs ...
Debian Bug report logs - #801089 spice: CVE-2015-5260: Insufficient validation of surface_id parameter can cause crash Package: src:spice; Maintainer for src:spice is Liang Guo <guoliang@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 6 Oct 2015 07:21:02 UTC Severity: grave Tags: patch, ...
Debian Bug report logs - #801091 spice: CVE-2015-5261: host memory access from guest using crafted images Package: src:spice; Maintainer for src:spice is Liang Guo <guoliang@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 6 Oct 2015 07:24:06 UTC Severity: grave Tags: patch, security, up ...