Vulnerability Description
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spice Project | Spice | < 0.14.2 |
| Redhat | Openstack | 16.1 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 9.0 |
| Opensuse | Leap | 15.2 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Enterprise Linux Aus | 8.2 |
| Redhat | Enterprise Linux Eus | 8.1 |
| Redhat | Enterprise Linux Tus | 8.2 |
| Redhat | Enterprise Linux Update Services For Sap Solutions | 8.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.htmlMailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1868435Issue TrackingPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2020/11/msg00001.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/11/msg00002.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4572-1/Third Party Advisory
- https://usn.ubuntu.com/4572-2/Third Party Advisory
- https://www.debian.org/security/2020/dsa-4771Third Party Advisory
- https://www.openwall.com/lists/oss-security/2020/10/06/10Mailing ListPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.htmlMailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1868435Issue TrackingPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2020/11/msg00001.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/11/msg00002.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4572-1/Third Party Advisory
FAQ
What is CVE-2020-14355?
CVE-2020-14355 is a vulnerability with a CVSS score of 6.6 (MEDIUM). Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affec...
How severe is CVE-2020-14355?
CVE-2020-14355 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-14355?
Check the references section above for vendor advisories and patch information. Affected products include: Spice Project Spice, Redhat Openstack, Canonical Ubuntu Linux, Debian Debian Linux, Opensuse Leap.