This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote Oracle Linux host is missing one or more security updates.
From Red Hat Security Advisory 2016:1205 :
An update for spice is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The Simple Protocol for Independent Computing Environments (SPICE) is
a remote display system built for virtual environments which allows
the user to view a computing 'desktop' environment not only on the
machine where it is running, but from anywhere on the Internet and
from a wide variety of machine architectures.
Security Fix(es) :
* A memory allocation flaw, leading to a heap-based buffer overflow,
was found in spice's smartcard interaction, which runs under the
QEMU-KVM context on the host. A user connecting to a guest VM using
spice could potentially use this flaw to crash the QEMU-KVM process or
execute arbitrary code with the privileges of the host's QEMU-KVM
* A memory access flaw was found in the way spice handled certain
guests using crafted primary surface parameters. A user in a guest
could use this flaw to read from and write to arbitrary memory
locations on the host. (CVE-2016-2150)
The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the
CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
See also :
Update the affected spice packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.1
Public Exploit Available : false