![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871446 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for spice-server RHSA-2015:1715-01 |
Resumen: | The remote host is missing an update for the 'spice-server'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'spice-server' package(s) announced via the referenced advisory. Vulnerability Insight: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A race condition flaw, leading to a heap-based memory corruption, was found in spice's worker_update_monitors_config() function, which runs under the QEMU-KVM context on the host. A user in a guest could leverage this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-3247) This issue was discovered by Frediano Ziglio of Red Hat. All spice-server users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. Affected Software/OS: spice-server on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-3247 1033459 http://www.securitytracker.com/id/1033459 1033460 http://www.securitytracker.com/id/1033460 1033753 http://www.securitytracker.com/id/1033753 DSA-3354 http://www.debian.org/security/2015/dsa-3354 RHSA-2015:1713 http://rhn.redhat.com/errata/RHSA-2015-1713.html RHSA-2015:1714 http://rhn.redhat.com/errata/RHSA-2015-1714.html RHSA-2015:1715 http://rhn.redhat.com/errata/RHSA-2015-1715.html USN-2736-1 http://www.ubuntu.com/usn/USN-2736-1 [Spice-devel] 20151006 Announcing spice 0.12.6 http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html openSUSE-SU-2015:1566 http://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |