Buffer Overflow Affecting spice package, versions [,0.14.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.15% (53rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SPICE-2370812
  • published26 Jan 2022
  • disclosed7 Oct 2020
  • creditUnknown

Introduced: 7 Oct 2020

CVE-2020-14355  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade spice to version 0.14.2 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.

CVSS Scores

version 3.1