SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Spice Vendors:   Red Hat
Spice Race Condition and Buffer Overflows Let Local Guest System Users Crash the Host or Execute Arbitrary Code on the Host System
SecurityTracker Alert ID:  1033753
SecurityTracker URL:  http://securitytracker.com/id/1033753
CVE Reference:   CVE-2015-3247, CVE-2015-5260, CVE-2015-5261   (Links to External Site)
Date:  Oct 7 2015
Impact:   Denial of service via network, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.12.6
Description:   Three vulnerabilities were reported in Spice. A local user on the guest system can cause denial of service conditions on the host system. A local user on the guest system can gain elevated privileges on the host system.

A local user on the guest system can supply specially crafted QXL command 'surface_id' parameter values to trigger a heap overflow and cause the target QEMU-KVM process on the host system to crash [CVE-2015-5260].

A local user on the guest system can supply specially crafted QXL commands to trigger a heap overflow and read or write arbitrary memory locations on the target host system [CVE-2015-5261]. This can be exploited to gain elevated privileges on the host system.

A local user on the guest system can trigger a race condition in the worker_update_monitors_config() function to cause the target QEMU-KVM process on the host system to crash [CVE-2015-3247].

Frediano Ziglio of Red Hat reported these vulnerabilities.

Impact:   A local user on the guest system can cause denial of service conditions on the host system.

A local user on the guest system can gain elevated privileges on the host system.

Solution:   The vendor has issued a fix (0.12.6).

The vendor's advisory is available at:

http://cgit.freedesktop.org/spice/spice/commit/?id=ee1beff2ab0961066c71466a195430fb2473240d

Vendor URL:  www.spice-space.org/ (Links to External Site)
Cause:   Access control error, Boundary error, State error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 7 2015 (Ubuntu Issues Fix) Spice Race Condition and Buffer Overflows Let Local Guest System Users Crash the Host or Execute Arbitrary Code on the Host System
Ubuntu has issued a fix for Ubuntu Linux 14.04 LTS and 15.04.
Oct 13 2015 (Red Hat Issues Fix) Spice Race Condition and Buffer Overflows Let Local Guest System Users Crash the Host or Execute Arbitrary Code on the Host System
Red Hat has issued a fix for Red Hat Enterprise Linux 7.
Oct 13 2015 (Red Hat Issues Fix) Spice Race Condition and Buffer Overflows Let Local Guest System Users Crash the Host or Execute Arbitrary Code on the Host System
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Oct 13 2015 (CentOS Issues Fix) Spice Race Condition and Buffer Overflows Let Local Guest System Users Crash the Host or Execute Arbitrary Code on the Host System
CentOS has issued a fix for CentOS Linux 6 and 7.
Oct 13 2015 (Oracle Issues Fix for Oracle Linux) Spice Race Condition and Buffer Overflows Let Local Guest System Users Crash the Host or Execute Arbitrary Code on the Host System
Oracle has issued a fix for Oracle Linux 6 and 7.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC