Scientific Linux Security Update : spice-server on SL6.x x86_64 (20130903)

medium Nessus Plugin ID 69786

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A flaw was found in the way concurrent access to the clients ring buffer was performed in the spice-server library. A remote user able to initiate a SPICE connection to an application acting as a SPICE server could use this flaw to crash the application. (CVE-2013-4130)

Applications acting as a SPICE server must be restarted for this update to take effect. Note that QEMU-KVM guests providing SPICE console access must be restarted for this update to take effect.

Solution

Update the affected spice-server, spice-server-debuginfo and / or spice-server-devel packages.

See Also

http://www.nessus.org/u?d0a53d0c

Plugin Details

Severity: Medium

ID: 69786

File Name: sl_20130903_spice_server_on_SL6_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 9/5/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:spice-server, p-cpe:/a:fermilab:scientific_linux:spice-server-debuginfo, p-cpe:/a:fermilab:scientific_linux:spice-server-devel, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 9/3/2013

Vulnerability Publication Date: 8/20/2013

Reference Information

CVE: CVE-2013-4130