RHEL 7 : spice (RHSA-2017:2471)

Medium Nessus Plugin ID 102517


The remote Red Hat host is missing one or more security updates.


An update for spice is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.

Security Fix(es) :

* A vulnerability was discovered in spice server's protocol handling.
An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash. (CVE-2017-7506)

This issue was discovered by Frediano Ziglio (Red Hat).


Update the affected spice-debuginfo, spice-server and / or spice-server-devel packages.

See Also



Plugin Details

Severity: Medium

ID: 102517

File Name: redhat-RHSA-2017-2471.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2017/08/16

Modified: 2018/01/25

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.5

Temporal Score: 5.2

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:ND/RC:UR


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:spice-debuginfo, p-cpe:/a:redhat:enterprise_linux:spice-server, p-cpe:/a:redhat:enterprise_linux:spice-server-devel, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:7.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/08/15

Reference Information

CVE: CVE-2017-7506

OSVDB: 160977

RHSA: 2017:2471