CVE-2013-4130

NameCVE-2013-4130
DescriptionThe (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2839-1
NVD severitymedium (attack range: remote)
Debian Bugs717030
Debian/oldoldstablenot known to be vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spice (PTS)wheezy, wheezy (security)0.11.0-1+deb7u1fixed
stretch, sid, jessie0.12.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spicesource(unstable)0.12.4-0nocelt1low717030
spicesourcewheezy0.11.0-1+deb7u1mediumDSA-2839-1

Notes

[wheezy] - spice <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems