Scientific Linux Security Update : spice on SL7.x x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Security Fix(es) :

- A memory allocation flaw, leading to a heap-based buffer
overflow, was found in spice's smartcard interaction,
which runs under the QEMU-KVM context on the host. A
user connecting to a guest VM using spice could
potentially use this flaw to crash the QEMU-KVM process
or execute arbitrary code with the privileges of the
host's QEMU-KVM process. (CVE-2016-0749)

- A memory access flaw was found in the way spice handled
certain guests using crafted primary surface parameters.
A user in a guest could use this flaw to read from and
write to arbitrary memory locations on the host.
(CVE-2016-2150)

See also :

http://www.nessus.org/u?3857373a

Solution :

Update the affected spice-debuginfo, spice-server and / or
spice-server-devel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 91514 ()

Bugtraq ID:

CVE ID: CVE-2016-0749
CVE-2016-2150

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now