10
CVSSv2

CVE-2017-12194

Published: 14/03/2018 Updated: 17/06/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions up to and including 0.34 are believed to be vulnerable.

Vulnerable Product Search on Vulmon Subscribe to Product

spice-gtk project spice-gtk

Vendor Advisories

Debian Bug report logs - #898503 spice-gtk: CVE-2017-12194: Integer overflows causing buffer overflows in spice-client Package: src:spice-gtk; Maintainer for src:spice-gtk is Liang Guo <guoliang@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 12 May 2018 20:21:01 UTC Severity: important ...
Spice could be made to crash or run programs if it received specially crafted network traffic ...
A flaw was found in the way spice-client processed certain messages sent from the server An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client ...