Scientific Linux Security Update : spice on SL7.x x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Security Fix(es) :

- A memory allocation flaw, leading to a heap-based buffer
overflow, was found in spice's smartcard interaction,
which runs under the QEMU-KVM context on the host. A
user connecting to a guest VM using spice could
potentially use this flaw to crash the QEMU-KVM process
or execute arbitrary code with the privileges of the
host's QEMU-KVM process. (CVE-2016-0749)

- A memory access flaw was found in the way spice handled
certain guests using crafted primary surface parameters.
A user in a guest could use this flaw to read from and
write to arbitrary memory locations on the host.

See also :

Solution :

Update the affected spice-debuginfo, spice-server and / or
spice-server-devel packages.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 91514 ()

Bugtraq ID:

CVE ID: CVE-2016-0749

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now