MEDIUM · 6.6

CVE-2020-14355

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affec...

Vulnerability Description

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.

CVSS Score

6.6

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
Spice ProjectSpice< 0.14.2
RedhatOpenstack16.1
CanonicalUbuntu Linux14.04
DebianDebian Linux9.0
OpensuseLeap15.2
RedhatEnterprise Linux6.0
RedhatEnterprise Linux Aus8.2
RedhatEnterprise Linux Eus8.1
RedhatEnterprise Linux Tus8.2
RedhatEnterprise Linux Update Services For Sap Solutions8.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-14355?

CVE-2020-14355 is a vulnerability with a CVSS score of 6.6 (MEDIUM). Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affec...

How severe is CVE-2020-14355?

CVE-2020-14355 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-14355?

Check the references section above for vendor advisories and patch information. Affected products include: Spice Project Spice, Redhat Openstack, Canonical Ubuntu Linux, Debian Debian Linux, Opensuse Leap.