|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for spice-server CESA-2018:3522 centos6|
|Summary:||The remote host is missing an update for the 'spice-server'; package(s) announced via the CESA-2018:3522 advisory.|
The remote host is missing an update for the 'spice-server'
package(s) announced via the CESA-2018:3522 advisory.
The Simple Protocol for Independent Computing Environments (SPICE) is a
remote display protocol for virtual environments. SPICE users can access a
virtualized desktop or server from the local system or any system with
network access to the server. SPICE is used in Red Hat Enterprise Linux for
viewing virtualized guests running on the Kernel-based Virtual Machine
(KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors.
* spice: Possible buffer overflow via invalid monitor configurations
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
This issue was discovered by Frediano Ziglio (Red Hat).
spice-server on CentOS 6.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2017-7506|
Debian Security Information: DSA-3907 (Google Search)
RedHat Security Advisories: RHSA-2017:2471
RedHat Security Advisories: RHSA-2018:3522
BugTraq ID: 99583
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.