Scientific Linux Security Update : spice-server on SL6.x x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Security Fix(es) :

- A memory allocation flaw, leading to a heap-based buffer
overflow, was found in spice's smartcard interaction,
which runs under the QEMU-KVM context on the host. A
user connecting to a guest VM using spice could
potentially use this flaw to crash the QEMU-KVM process
or execute arbitrary code with the privileges of the
host's QEMU-KVM process. (CVE-2016-0749)

- A memory access flaw was found in the way spice handled
certain guests using crafted primary surface parameters.
A user in a guest could use this flaw to read from and
write to arbitrary memory locations on the host.

The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the
CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).

See also :

Solution :

Update the affected spice-server, spice-server-debuginfo and / or
spice-server-devel packages.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 91647 ()

Bugtraq ID:

CVE ID: CVE-2016-0749

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now