Vulnerability Details CVE-2018-10873
A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 66.2%
CVSS Severity
CVSS v3 Score 8.3
CVSS v2 Score 6.5
Products affected by CVE-2018-10873
-
cpe:2.3:a:redhat:virtualization:4.0
-
cpe:2.3:a:redhat:virtualization_host:4.0
-
cpe:2.3:a:spice_project:spice:-
-
cpe:2.3:a:spice_project:spice:0.10.0
-
cpe:2.3:a:spice_project:spice:0.10.1
-
cpe:2.3:a:spice_project:spice:0.11.0
-
cpe:2.3:a:spice_project:spice:0.11.3
-
cpe:2.3:a:spice_project:spice:0.12.0
-
cpe:2.3:a:spice_project:spice:0.12.2
-
cpe:2.3:a:spice_project:spice:0.12.3
-
cpe:2.3:a:spice_project:spice:0.12.4
-
cpe:2.3:a:spice_project:spice:0.12.5
-
cpe:2.3:a:spice_project:spice:0.12.6
-
cpe:2.3:a:spice_project:spice:0.12.7
-
cpe:2.3:a:spice_project:spice:0.12.8
-
cpe:2.3:a:spice_project:spice:0.13.0
-
cpe:2.3:a:spice_project:spice:0.13.1
-
cpe:2.3:a:spice_project:spice:0.13.2
-
cpe:2.3:a:spice_project:spice:0.13.3
-
cpe:2.3:a:spice_project:spice:0.13.90
-
cpe:2.3:a:spice_project:spice:0.13.91
-
cpe:2.3:a:spice_project:spice:0.14.0
-
cpe:2.3:a:spice_project:spice:0.5.2
-
cpe:2.3:a:spice_project:spice:0.5.3
-
cpe:2.3:a:spice_project:spice:0.6.0
-
cpe:2.3:a:spice_project:spice:0.6.1
-
cpe:2.3:a:spice_project:spice:0.6.2
-
cpe:2.3:a:spice_project:spice:0.6.3
-
cpe:2.3:a:spice_project:spice:0.6.4
-
cpe:2.3:a:spice_project:spice:0.7.0
-
cpe:2.3:a:spice_project:spice:0.7.1
-
cpe:2.3:a:spice_project:spice:0.7.2
-
cpe:2.3:a:spice_project:spice:0.7.3
-
cpe:2.3:a:spice_project:spice:0.8.0
-
cpe:2.3:a:spice_project:spice:0.8.1
-
cpe:2.3:a:spice_project:spice:0.8.2
-
cpe:2.3:a:spice_project:spice:0.8.3
-
cpe:2.3:a:spice_project:spice:0.9.0
-
cpe:2.3:a:spice_project:spice:0.9.1
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server:6.0
-
cpe:2.3:o:redhat:enterprise_linux_server:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
-
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0