Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.842434
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-2736-1)
Summary:The remote host is missing an update for the 'spice' package(s) announced via the USN-2736-1 advisory.
Description:Summary:
The remote host is missing an update for the 'spice' package(s) announced via the USN-2736-1 advisory.

Vulnerability Insight:
Frediano Ziglio discovered that Spice incorrectly handled monitor configs.
A malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile.

Affected Software/OS:
'spice' package(s) on Ubuntu 14.04, Ubuntu 15.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-3247
1033459
http://www.securitytracker.com/id/1033459
1033460
http://www.securitytracker.com/id/1033460
1033753
http://www.securitytracker.com/id/1033753
DSA-3354
http://www.debian.org/security/2015/dsa-3354
RHSA-2015:1713
http://rhn.redhat.com/errata/RHSA-2015-1713.html
RHSA-2015:1714
http://rhn.redhat.com/errata/RHSA-2015-1714.html
RHSA-2015:1715
http://rhn.redhat.com/errata/RHSA-2015-1715.html
USN-2736-1
http://www.ubuntu.com/usn/USN-2736-1
[Spice-devel] 20151006 Announcing spice 0.12.6
http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
openSUSE-SU-2015:1566
http://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.