![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.871757 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Update for spice-server RHSA-2017:0253-01 |
Summary: | The remote host is missing an update for the 'spice-server'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'spice-server' package(s) announced via the referenced advisory. Vulnerability Insight: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. Security Fix(es): * A vulnerability was discovered in spice in the server's protocol handling. An authenticated attacker could send crafted messages to the spice server causing a heap overflow leading to a crash or possible code execution. (CVE-2016-9577) * A vulnerability was discovered in spice in the server's protocol handling. An attacker able to connect to the spice server could send crafted messages which would cause the process to crash. (CVE-2016-9578) These issues were discovered by Frediano Ziglio (Red Hat). Affected Software/OS: spice-server on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 6.5 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-9577 BugTraq ID: 96040 http://www.securityfocus.com/bid/96040 Debian Security Information: DSA-3790 (Google Search) https://www.debian.org/security/2017/dsa-3790 RedHat Security Advisories: RHSA-2017:0253 http://rhn.redhat.com/errata/RHSA-2017-0253.html RedHat Security Advisories: RHSA-2017:0254 https://access.redhat.com/errata/RHSA-2017:0254 RedHat Security Advisories: RHSA-2017:0549 http://rhn.redhat.com/errata/RHSA-2017-0549.html RedHat Security Advisories: RHSA-2017:0552 https://access.redhat.com/errata/RHSA-2017:0552 Common Vulnerability Exposure (CVE) ID: CVE-2016-9578 BugTraq ID: 96118 http://www.securityfocus.com/bid/96118 |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |