CVE-2015-5260Improper Restriction of Operations within the Bounds of a Memory Buffer in Project Spice

Severity
7.8HIGHNVD
EPSS
0.2%
top 52.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 7
Latest updateMay 17

Description

Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages7 packages

Debianspice_project/spice< 0.12.5-1.3+3
Ubuntuspice_project/spice< 0.12.4-0nocelt2ubuntu1.2

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 14.04, 15.04, Enterprise Linux 6.7.z, 7.1

🔴Vulnerability Details

4
GHSA
GHSA-3ggj-v8pg-xq6f: Heap-based buffer overflow in SPICE before 02022-05-17
OSV
CVE-2015-5260: Heap-based buffer overflow in SPICE before 02016-06-07
CVEList
CVE-2015-5260: Heap-based buffer overflow in SPICE before 02016-06-07
OSV
spice vulnerabilities2015-10-07

📋Vendor Advisories

3
Ubuntu
Spice vulnerabilities2015-10-07
Red Hat
spice: insufficient validation of surface_id parameter can cause crash2015-09-08
Debian
CVE-2015-5260: spice - Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause...2015

💬Community

2
Bugzilla
CVE-2015-5260 spice: insufficient validation of surface_id parameter can cause crash [fedora-all]2015-09-08
Bugzilla
CVE-2015-5260 spice: insufficient validation of surface_id parameter can cause crash2015-09-08
CVE-2015-5260 — Spice Project Spice vulnerability | cvebase