Vulnerability Description
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Hpc Node | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Eus | 6.7.z |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Redhat | Enterprise Linux Hpc Node Eus | 7.1 |
| Debian | Debian Linux | 7.0 |
| Spice Project | Spice | <= 0.12.5 |
Related Weaknesses (CWE)
References
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.h
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
FAQ
What is CVE-2015-5261?
CVE-2015-5261 is a vulnerability with a CVSS score of 7.1 (HIGH). Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
How severe is CVE-2015-5261?
CVE-2015-5261 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5261?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Hpc Node, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Eus.