6.3
CVSSv3

CVE-2020-25653

Published: 26/11/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5.4 | Impact Score: 7.8 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.3 | Impact Score: 5.2 | Exploitability Score: 1
VMScore: 481
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C

Vulnerability Summary

A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

spice-space spice-vdagent

debian debian linux 9.0

fedoraproject fedora 32

fedoraproject fedora 33

Vendor Advisories

Debian Bug report logs - #973769 spice-vdagent: CVE-2020-25650 CVE-2020-25651 CVE-2020-25652 CVE-2020-25653 Package: src:spice-vdagent; Maintainer for src:spice-vdagent is Liang Guo <guoliang@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 4 Nov 2020 20:33:01 UTC Severity: grave Tags: s ...
A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host The highest threat from this vulnerability is to data confid ...