Rapid7 Vulnerability & Exploit Database

RHSA-2010:0633: qspice security update

Back to Search

RHSA-2010:0633: qspice security update

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
08/24/2010
Created
07/25/2018
Added
08/30/2010
Modified
07/04/2017

Description

The Simple Protocol for Independent Computing Environments (SPICE) is aremote display protocol used in Red Hat Enterprise Linux for viewingvirtualized guests running on the Kernel-based Virtual Machine (KVM)hypervisor, or on Red Hat Enterprise Virtualization Hypervisor.It was found that the libspice component of QEMU-KVM on the host did notvalidate all pointers provided from a guest system's QXL graphics carddriver. A privileged guest user could use this flaw to cause the host todereference an invalid pointer, causing the guest to crash (denial ofservice) or, possibly, resulting in the privileged guest user escalatingtheir privileges on the host. (CVE-2010-0428)It was found that the libspice component of QEMU-KVM on the host could beforced to perform certain memory management operations on memory addressescontrolled by a guest. A privileged guest user could use this flaw to crashthe guest (denial of service) or, possibly, escalate their privileges onthe host. (CVE-2010-0429)All qspice users should upgrade to these updated packages, which containbackported patches to correct these issues.

Solution(s)

  • redhat-upgrade-qspice
  • redhat-upgrade-qspice-libs
  • redhat-upgrade-qspice-libs-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;