CVE-2013-4130
20.08.2013, 22:55
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.Enginsight
Vendor | Product | Version |
---|---|---|
spice_project | spice | 𝑥 ≤ 0.12.3 |
spice_project | spice | 0.5.2 |
spice_project | spice | 0.5.3 |
spice_project | spice | 0.6.0 |
spice_project | spice | 0.6.1 |
spice_project | spice | 0.6.2 |
spice_project | spice | 0.6.3 |
spice_project | spice | 0.6.4 |
spice_project | spice | 0.7.0 |
spice_project | spice | 0.7.1 |
spice_project | spice | 0.7.2 |
spice_project | spice | 0.7.3 |
spice_project | spice | 0.8.0 |
spice_project | spice | 0.8.1 |
spice_project | spice | 0.8.2 |
spice_project | spice | 0.8.3 |
spice_project | spice | 0.9.0 |
spice_project | spice | 0.9.1 |
spice_project | spice | 0.10.0 |
spice_project | spice | 0.10.1 |
spice_project | spice | 0.11.0 |
spice_project | spice | 0.11.3 |
spice_project | spice | 0.12.0 |
spice_project | spice | 0.12.2 |
canonical | ubuntu_linux | 13.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
spice |
|
Common Weakness Enumeration
References