Vulnerability Description
Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spice Project | Spice | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2019:2229
- https://access.redhat.com/errata/RHSA-2020:0471
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10893Issue TrackingPatchThird Party Advisory
- https://lists.freedesktop.org/archives/spice-devel/2018-July/044489.htmlMailing ListPatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2229
- https://access.redhat.com/errata/RHSA-2020:0471
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10893Issue TrackingPatchThird Party Advisory
- https://lists.freedesktop.org/archives/spice-devel/2018-July/044489.htmlMailing ListPatchThird Party Advisory
FAQ
What is CVE-2018-10893?
CVE-2018-10893 is a vulnerability with a CVSS score of 7.6 (HIGH). Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arb...
How severe is CVE-2018-10893?
CVE-2018-10893 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10893?
Check the references section above for vendor advisories and patch information. Affected products include: Spice Project Spice.