Vulnerability Details CVE-2013-4130
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 76.9%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2013-4130
-
cpe:2.3:a:spice_project:spice:-
-
cpe:2.3:a:spice_project:spice:0.10.0
-
cpe:2.3:a:spice_project:spice:0.10.1
-
cpe:2.3:a:spice_project:spice:0.11.0
-
cpe:2.3:a:spice_project:spice:0.11.3
-
cpe:2.3:a:spice_project:spice:0.12.0
-
cpe:2.3:a:spice_project:spice:0.12.2
-
cpe:2.3:a:spice_project:spice:0.12.3
-
cpe:2.3:a:spice_project:spice:0.5.2
-
cpe:2.3:a:spice_project:spice:0.5.3
-
cpe:2.3:a:spice_project:spice:0.6.0
-
cpe:2.3:a:spice_project:spice:0.6.1
-
cpe:2.3:a:spice_project:spice:0.6.2
-
cpe:2.3:a:spice_project:spice:0.6.3
-
cpe:2.3:a:spice_project:spice:0.6.4
-
cpe:2.3:a:spice_project:spice:0.7.0
-
cpe:2.3:a:spice_project:spice:0.7.1
-
cpe:2.3:a:spice_project:spice:0.7.2
-
cpe:2.3:a:spice_project:spice:0.7.3
-
cpe:2.3:a:spice_project:spice:0.8.0
-
cpe:2.3:a:spice_project:spice:0.8.1
-
cpe:2.3:a:spice_project:spice:0.8.2
-
cpe:2.3:a:spice_project:spice:0.8.3
-
cpe:2.3:a:spice_project:spice:0.9.0
-
cpe:2.3:a:spice_project:spice:0.9.1
-
cpe:2.3:o:canonical:ubuntu_linux:13.04