openSUSE Security Update : spice (openSUSE-2017-227)

High Nessus Plugin ID 97077


The remote openSUSE host is missing a security update.


This security update for spice fixes the following issues :

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used by unauthenticated attackers to execute arbitrary code. (bsc#1023078) CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message.

This update was imported from the SUSE:SLE-12-SP1:Update update project.


Update the affected spice packages.

See Also

Plugin Details

Severity: High

ID: 97077

File Name: openSUSE-2017-227.nasl

Version: $Revision: 3.1 $

Type: local

Agent: unix

Published: 2017/02/09

Modified: 2017/02/09

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libspice-server-devel, p-cpe:/a:novell:opensuse:libspice-server1, p-cpe:/a:novell:opensuse:libspice-server1-debuginfo, p-cpe:/a:novell:opensuse:spice-client, p-cpe:/a:novell:opensuse:spice-client-debuginfo, p-cpe:/a:novell:opensuse:spice-debugsource, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2017/02/08

Reference Information

CVE: CVE-2016-9577, CVE-2016-9578