idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
12,291
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_handle_agent_mouse_event(const VDAgentMouseState *mouse_state) { SpiceCharDeviceWriteBuffer *char_dev_buf; VDInternalBuf *internal_buf; uint32_t total_msg_size; if (!inputs_inited() || !reds->agent_state.base) { return; } total_msg_size = sizeof(VDIChunkHeader) + sizeof(VDAge...
105,637,752,762,884,650,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,292
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_mechanism(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; spice_info("Auth method: %d", link->auth_mechanism.auth_mechanism); if (link->auth_mechanism.auth_mechanism == SPICE_COMMON_CAP_AUTH_SPICE && !sasl_enabled ) { reds_get_spice_ticket(li...
15,337,848,544,551,474,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,293
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_mechlen(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; AsyncRead *obj = &link->async_read; RedsSASL *sasl = &link->stream->sasl; if (sasl->len < 1 || sasl->len > 100) { spice_warning("Got bad client mechname len %d", sasl->len); reds_link_free(li...
302,616,390,465,038,160,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,294
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_mechname(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; AsyncRead *obj = &link->async_read; RedsSASL *sasl = &link->stream->sasl; sasl->mechname[sasl->len] = '\0'; spice_info("Got client mechname '%s' check against '%s'", sasl->mechname, sasl-...
67,408,300,172,263,280,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,295
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_sasl_start(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; AsyncRead *obj = &link->async_read; const char *serverout; unsigned int serveroutlen; int err; char *clientdata = NULL; RedsSASL *sasl = &link->stream->sasl; uint32_t datalen = sasl->len; ...
6,403,374,681,113,668,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,296
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_sasl_step(void *opaque) { const char *serverout; unsigned int serveroutlen; int err; char *clientdata = NULL; RedLinkInfo *link = (RedLinkInfo *)opaque; RedsSASL *sasl = &link->stream->sasl; uint32_t datalen = sasl->len; AsyncRead *obj = &link->async_read; ...
224,056,774,608,558,030,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,297
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_sasl_steplen(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; AsyncRead *obj = &link->async_read; RedsSASL *sasl = &link->stream->sasl; spice_info("Got steplen %d", sasl->len); if (sasl->len > SASL_DATA_MAX_LEN) { spice_warning("Too much SASL data %d",...
22,455,173,760,452,070,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,298
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_auth_startlen(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; AsyncRead *obj = &link->async_read; RedsSASL *sasl = &link->stream->sasl; spice_info("Got client start len %d", sasl->len); if (sasl->len > SASL_DATA_MAX_LEN) { spice_warning("Too much SASL data...
141,895,389,034,456,160,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,299
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_handle_channel_event(int event, SpiceChannelEventInfo *info) { if (core->base.minor_version >= 3 && core->channel_event != NULL) core->channel_event(event, info); if (event == SPICE_CHANNEL_EVENT_DISCONNECTED) { free(info); } }
6,327,112,612,440,010,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,300
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_link_error(void *opaque, int err) { RedLinkInfo *link = (RedLinkInfo *)opaque; switch (err) { case 0: case EPIPE: break; default: spice_warning("%s", strerror(errno)); break; } reds_link_free(link); }
70,755,214,595,952,670,000,000,000,000,000,000,000
reds.cpp
235,495,253,173,269,550,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,301
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_main_link(RedLinkInfo *link) { RedClient *client; RedsStream *stream; SpiceLinkMess *link_mess; uint32_t *caps; uint32_t connection_id; MainChannelClient *mcc; int mig_target = FALSE; spice_info(NULL); spice_assert(reds->main_channel); link_mess = link->...
328,122,620,684,859,860,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,302
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
int reds_handle_migrate_data(MainChannelClient *mcc, SpiceMigrateDataMain *mig_data, uint32_t size) { VDIPortState *agent_state = &reds->agent_state; /* * Now that the client has switched to the target server, if main_channel * controls the mm-time, we update the client's mm-time. * (MSG_MAIN_IN...
225,263,967,624,812,820,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,303
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_new_link(RedLinkInfo *link) { AsyncRead *obj = &link->async_read; obj->opaque = link; obj->stream = link->stream; obj->now = (uint8_t *)&link->link_header; obj->end = (uint8_t *)((SpiceLinkHeader *)&link->link_header + 1); obj->done = reds_handle_read_header_done; obj...
270,499,767,257,444,140,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,304
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_other_links(RedLinkInfo *link) { RedChannel *channel; RedClient *client = NULL; SpiceLinkMess *link_mess; RedsMigTargetClient *mig_client; link_mess = link->link_mess; if (reds->main_channel) { client = main_channel_get_client_by_link_id(reds->main_channel, ...
128,714,081,008,727,080,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,305
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_read_header_done(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; SpiceLinkHeader *header = &link->link_header; AsyncRead *obj = &link->async_read; if (header->magic != SPICE_MAGIC) { reds_send_link_error(link, SPICE_LINK_ERR_INVALID_MAGIC); reds_link_f...
12,177,488,769,661,625,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,306
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_read_link_done(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; SpiceLinkMess *link_mess = link->link_mess; AsyncRead *obj = &link->async_read; uint32_t num_caps = link_mess->num_common_caps + link_mess->num_channel_caps; uint32_t *caps = (uint32_t *)((uint8_t *)lin...
95,217,523,403,386,500,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,307
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_handle_ssl_accept(int fd, int event, void *data) { RedLinkInfo *link = (RedLinkInfo *)data; int return_code; if ((return_code = SSL_accept(link->stream->ssl)) != 1) { int ssl_error = SSL_get_error(link->stream->ssl, return_code); if (ssl_error != SSL_ERROR_WANT_READ && ssl_...
150,051,238,563,088,300,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,308
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
int reds_has_vdagent(void) { return !!vdagent; }
61,250,574,637,453,080,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,309
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_info_new_channel(RedLinkInfo *link, int connection_id) { spice_info("channel %d:%d, connected successfully, over %s link", link->link_mess->channel_type, link->link_mess->channel_id, link->stream->ssl == NULL ? "Non Secure" : "Secure"); /* add info +...
333,726,455,128,359,680,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,310
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static RedLinkInfo *reds_init_client_connection(int socket) { RedLinkInfo *link; RedsStream *stream; int delay_val = 1; int flags; if ((flags = fcntl(socket, F_GETFL)) == -1) { spice_warning("accept failed, %s", strerror(errno)); goto error; } if (fcntl(socket, F_SETFL, fla...
194,765,804,769,429,770,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,311
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static RedLinkInfo *reds_init_client_ssl_connection(int socket) { RedLinkInfo *link; int return_code; int ssl_error; BIO *sbio; link = reds_init_client_connection(socket); if (link == NULL) goto error; if (!(sbio = BIO_new_socket(link->stream->socket, BIO_NOCLOSE))) { spice...
234,554,348,981,118,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,312
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_init_net(void) { if (spice_port != -1) { reds->listen_socket = reds_init_socket(spice_addr, spice_port, spice_family); if (-1 == reds->listen_socket) { return -1; } reds->listen_watch = core->watch_add(reds->listen_socket, ...
147,135,263,636,513,970,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,313
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_init_ssl(void) { #if OPENSSL_VERSION_NUMBER >= 0x10000000L const SSL_METHOD *ssl_method; #else SSL_METHOD *ssl_method; #endif int return_code; long ssl_options = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3; /* Global system initialization*/ SSL_library_init(); SSL_load_error_strings()...
183,141,513,247,355,300,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,314
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_link_free(RedLinkInfo *link) { reds_stream_free(link->stream); link->stream = NULL; free(link->link_mess); link->link_mess = NULL; BN_free(link->tiTicketing.bn); link->tiTicketing.bn = NULL; if (link->tiTicketing.rsa) { RSA_free(link->tiTicketing.rsa); lin...
100,064,932,290,032,490,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,315
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_link_mig_target_channels(RedClient *client) { RedsMigTargetClient *mig_client; RingItem *item; spice_info("%p", client); mig_client = reds_mig_target_client_find(client); if (!mig_client) { spice_info("Error: mig target client was not found"); return FALSE; } ...
57,158,108,180,204,060,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,316
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_main_channel_connected(void) { return main_channel_is_connected(reds->main_channel); }
310,663,762,080,715,030,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,317
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_marshall_migrate_data(SpiceMarshaller *m) { SpiceMigrateDataMain mig_data; VDIPortState *agent_state = &reds->agent_state; SpiceMarshaller *m2; memset(&mig_data, 0, sizeof(mig_data)); spice_marshaller_add_uint32(m, SPICE_MIGRATE_DATA_MAIN_MAGIC); spice_marshaller_add_uint32(m, SPICE_M...
223,996,550,799,081,440,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,318
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_cleanup(void) { if (reds->mig_inprogress) { if (reds->mig_wait_connect || reds->mig_wait_disconnect) { SpiceMigrateInterface *sif; spice_assert(migration_interface); sif = SPICE_CONTAINEROF(migration_interface->base.sif, SpiceMigrateInterface, base);...
153,782,643,349,629,780,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,319
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_cleanup_wait_disconnect(void) { RingItem *wait_client_item; while ((wait_client_item = ring_get_tail(&reds->mig_wait_disconnect_clients))) { RedsMigWaitDisconnectClient *wait_client; wait_client = SPICE_CONTAINEROF(wait_client_item, RedsMigWaitDisconnectClient, link); ...
253,403,693,654,985,960,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,320
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_disconnect(void) { if (reds_main_channel_connected()) { reds_disconnect(); } else { reds_mig_cleanup(); } }
278,240,234,130,696,050,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,321
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_fill_wait_disconnect(void) { RingItem *client_item; spice_assert(reds->num_clients > 0); /* tracking the clients, in order to ignore disconnection * of clients that got connected to the src after migration completion.*/ RING_FOREACH(client_item, &reds->clients) { RedCl...
115,710,845,163,992,260,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,322
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_finished(int completed) { spice_info(NULL); reds->mig_inprogress = TRUE; if (reds->src_do_seamless_migrate && completed) { reds_migrate_channels_seamless(); } else { main_channel_migrate_src_complete(reds->main_channel, completed); } if (completed) { ...
314,739,547,030,819,020,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,323
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_release(void) { if (reds->mig_spice) { free(reds->mig_spice->cert_subject); free(reds->mig_spice->host); free(reds->mig_spice); reds->mig_spice = NULL; } }
226,695,303,062,112,430,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,324
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_remove_wait_disconnect_client(RedClient *client) { RingItem *wait_client_item; RING_FOREACH(wait_client_item, &reds->mig_wait_disconnect_clients) { RedsMigWaitDisconnectClient *wait_client; wait_client = SPICE_CONTAINEROF(wait_client_item, RedsMigWaitDisconnectClient, link...
179,623,076,062,898,050,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,325
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_started(void) { spice_info(NULL); spice_assert(reds->mig_spice); reds->mig_inprogress = TRUE; reds->mig_wait_connect = TRUE; core->timer_start(reds->mig_timer, MIGRATE_TIMEOUT); }
419,818,586,049,784,060,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,326
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_switch(void) { if (!reds->mig_spice) { spice_warning("reds_mig_switch called without migrate_info set"); return; } main_channel_migrate_switch(reds->main_channel, reds->mig_spice); reds_mig_release(); }
195,602,732,555,559,700,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,327
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_target_client_add_pending_link(RedsMigTargetClient *client, SpiceLinkMess *link_msg, RedsStream *stream) { RedsMigPendingLink *mig_link; spice_assert(reds); spice_assert(client); ...
121,476,104,397,289,200,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,328
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_target_client_disconnect_all(void) { RingItem *now, *next; RING_FOREACH_SAFE(now, next, &reds->mig_target_clients) { RedsMigTargetClient *mig_client = SPICE_CONTAINEROF(now, RedsMigTargetClient, link); reds_client_disconnect(mig_client->client); } }
76,581,908,409,932,270,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,329
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static RedsMigTargetClient* reds_mig_target_client_find(RedClient *client) { RingItem *item; RING_FOREACH(item, &reds->mig_target_clients) { RedsMigTargetClient *mig_client; mig_client = SPICE_CONTAINEROF(item, RedsMigTargetClient, link); if (mig_client->client == client) { ...
196,542,163,654,756,800,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,330
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_mig_target_client_free(RedsMigTargetClient *mig_client) { RingItem *now, *next; ring_remove(&mig_client->link); reds->num_mig_target_clients--; RING_FOREACH_SAFE(now, next, &mig_client->pending_links) { RedsMigPendingLink *mig_link = SPICE_CONTAINEROF(now, RedsMigPendingLink, ...
221,517,275,174,262,600,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,331
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_migrate_channels_seamless(void) { RedClient *client; /* seamless migration is supported for only one client for now */ client = reds_get_client(); red_client_migrate(client); }
260,512,255,240,408,100,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,332
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
int reds_num_of_channels(void) { return reds ? reds->num_of_channels : 0; }
307,168,335,850,184,000,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,333
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_char_device_state_destroy(SpiceCharDeviceState *dev) { reds_char_device_remove_state(dev); }
334,226,312,422,901,400,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,334
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_main_agent_data(MainChannelClient *mcc, void *message, size_t size) { VDIPortState *dev_state = &reds->agent_state; VDIChunkHeader *header; int res; res = agent_msg_filter_process_data(&reds->agent_state.write_filter, message, size); switch (res)...
132,643,246,060,312,670,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,335
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_on_main_agent_monitors_config( MainChannelClient *mcc, void *message, size_t size) { VDAgentMessage *msg_header; VDAgentMonitorsConfig *monitors_config; RedsClientMonitorsConfig *cmc = &reds->client_monitors_config; cmc->buffer_size += size; cmc->buffer = realloc(cmc->buffe...
230,207,907,506,310,950,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,336
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_main_agent_start(MainChannelClient *mcc, uint32_t num_tokens) { SpiceCharDeviceState *dev_state = reds->agent_state.base; RedChannelClient *rcc; if (!vdagent) { return; } spice_assert(vdagent->st && vdagent->st == dev_state); rcc = main_channel_client_get_base(mcc); red...
225,286,668,636,883,100,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,337
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_main_agent_tokens(MainChannelClient *mcc, uint32_t num_tokens) { if (!vdagent) { return; } spice_assert(vdagent->st); spice_char_device_send_to_client_tokens_add(vdagent->st, main_channel_client_get_base(mcc)->client, ...
290,793,708,498,662,350,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,338
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_main_channel_migrate(MainChannelClient *mcc) { VDIPortState *agent_state = &reds->agent_state; uint32_t read_data_len; spice_assert(reds->num_clients == 1); if (agent_state->read_state != VDI_PORT_READ_STATE_READ_DATA) { return; } spice_assert(agent_state->current_read_buf...
141,171,712,407,530,670,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,339
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_main_migrate_connected(int seamless) { reds->src_do_seamless_migrate = seamless; if (reds->mig_wait_connect) { reds_mig_cleanup(); } }
41,310,022,399,933,650,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,340
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_on_main_mouse_mode_request(void *message, size_t size) { switch (((SpiceMsgcMainMouseModeRequest *)message)->mode) { case SPICE_MOUSE_MODE_CLIENT: if (reds->is_client_mouse_allowed) { reds_set_mouse_mode(SPICE_MOUSE_MODE_CLIENT); } else { spice_info("client mous...
320,898,982,856,757,830,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,341
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
int reds_on_migrate_dst_set_seamless(MainChannelClient *mcc, uint32_t src_version) { /* seamless migration is not supported with multiple clients*/ if (reds->allow_multiple_clients || src_version > SPICE_MIGRATION_PROTOCOL_VERSION) { reds->dst_do_seamless_migrate = FALSE; } else { RedChanne...
268,069,831,142,608,900,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,342
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_register_channel(RedChannel *channel) { spice_assert(reds); ring_add(&reds->channels, &channel->link); reds->num_of_channels++; }
156,759,772,595,633,120,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,343
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_release_agent_data_buffer(uint8_t *buf) { VDIPortState *dev_state = &reds->agent_state; if (!dev_state->recv_from_client_buf) { free(buf); return; } spice_assert(buf == dev_state->recv_from_client_buf->buf + sizeof(VDIChunkHeader)); if (!dev_state->recv_from_client_buf_pu...
338,270,155,623,274,560,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,344
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_reset_vdp(void) { VDIPortState *state = &reds->agent_state; SpiceCharDeviceInterface *sif; state->read_state = VDI_PORT_READ_STATE_READ_HEADER; state->receive_pos = (uint8_t *)&state->vdi_chunk_header; state->receive_len = sizeof(state->vdi_chunk_header); state->message_receive...
326,472,338,430,636,040,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,345
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_send_link_ack(RedLinkInfo *link) { SpiceLinkHeader header; SpiceLinkReply ack; RedChannel *channel; RedChannelCapabilities *channel_caps; BUF_MEM *bmBuf; BIO *bio; int ret = FALSE; header.magic = SPICE_MAGIC; header.size = sizeof(ack); header.major_version = SPIC...
9,336,435,603,395,351,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,346
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_send_link_error(RedLinkInfo *link, uint32_t error) { SpiceLinkHeader header; SpiceLinkReply reply; header.magic = SPICE_MAGIC; header.size = sizeof(reply); header.major_version = SPICE_VERSION_MAJOR; header.minor_version = SPICE_VERSION_MINOR; memset(&reply, 0, sizeof(reply)...
260,665,153,638,861,240,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,347
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_send_link_result(RedLinkInfo *link, uint32_t error) { sync_write(link->stream, &error, sizeof(error)); }
18,939,895,681,443,420,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,348
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_send_mm_time(void) { if (!reds_main_channel_connected()) { return; } spice_debug(NULL); main_channel_push_multi_media_time(reds->main_channel, reds_get_mm_time() - reds->mm_time_latency); }
135,470,914,480,566,770,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,349
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_set_client_mm_time_latency(RedClient *client, uint32_t latency) { if (reds->mm_timer_enabled) { if (latency > reds->mm_time_latency) { reds->mm_time_latency = latency; reds_send_mm_time(); } else { spice_debug("new latency %u is smaller than existing %u"...
316,376,568,721,092,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,350
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
void reds_set_client_mouse_allowed(int is_client_mouse_allowed, int x_res, int y_res) { reds->monitor_mode.x_res = x_res; reds->monitor_mode.y_res = y_res; reds->dispatcher_allows_client_mouse = is_client_mouse_allowed; reds_update_mouse_mode(); if (reds->is_client_mouse_allowed && inputs_has_tablet...
143,623,565,698,009,750,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,351
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static int reds_set_migration_dest_info(const char* dest, int port, int secure_port, const char* cert_subject) { RedsMigSpice *spice_migration = NULL; reds_mig_release(); if ((port == -1 && secure_port == -1) || !dest) { ...
256,702,386,025,596,840,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,352
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_set_mouse_mode(uint32_t mode) { if (reds->mouse_mode == mode) { return; } reds->mouse_mode = mode; red_dispatcher_set_mouse_mode(reds->mouse_mode); main_channel_push_mouse_mode(reds->main_channel, reds->mouse_mode, reds->is_client_mouse_allowed); }
183,832,397,145,933,400,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,353
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_start_auth_sasl(RedLinkInfo *link) { const char *mechlist = NULL; sasl_security_properties_t secprops; int err; char *localAddr, *remoteAddr; int mechlistlen; AsyncRead *obj = &link->async_read; RedsSASL *sasl = &link->stream->sasl; /* Get local & remote client addresse...
128,891,806,341,556,050,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,354
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_stream_push_channel_event(RedsStream *s, int event) { main_dispatcher_channel_event(event, s->info); }
307,267,290,373,384,350,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,355
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
ssize_t reds_stream_read(RedsStream *s, void *buf, size_t nbyte) { ssize_t ret; #if HAVE_SASL if (s->sasl.conn && s->sasl.runSSF) { ret = reds_stream_sasl_read(s, buf, nbyte); } else #endif ret = s->read(s, buf, nbyte); return ret; }
276,220,860,867,197,100,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,356
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_stream_remove_watch(RedsStream* s) { if (s->watch) { core->watch_remove(s->watch); s->watch = NULL; } }
282,606,353,661,897,500,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,357
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
ssize_t reds_stream_write(RedsStream *s, const void *buf, size_t nbyte) { ssize_t ret; #if HAVE_SASL if (s->sasl.conn && s->sasl.runSSF) { ret = reds_stream_sasl_write(s, buf, nbyte); } else #endif ret = s->write(s, buf, nbyte); return ret; }
279,686,072,305,287,700,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,358
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
ssize_t reds_stream_writev(RedsStream *s, const struct iovec *iov, int iovcnt) { int i; int n; ssize_t ret = 0; if (s->writev != NULL) { return s->writev(s, iov, iovcnt); } for (i = 0; i < iovcnt; ++i) { n = reds_stream_write(s, iov[i].iov_base, iov[i].iov_len); if (n <...
64,118,521,042,019,140,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,359
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void reds_update_mouse_mode(void) { int allowed = 0; int qxl_count = red_dispatcher_qxl_count(); if ((agent_mouse && vdagent) || (inputs_has_tablet() && qxl_count == 1)) { allowed = reds->dispatcher_allows_client_mouse; } if (allowed == reds->is_client_mouse_allowed) { return...
85,353,159,508,226,800,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,360
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void set_image_compression(spice_image_compression_t val) { if (val == image_compression) { return; } image_compression = val; red_dispatcher_on_ic_change(); }
197,286,967,308,798,240,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,361
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
static void set_one_channel_security(int id, uint32_t security) { ChannelSecurityOptions *security_options; if ((security_options = find_channel_security(id))) { security_options->options = security; return; } security_options = spice_new(ChannelSecurityOptions, 1); security_options...
128,191,811,357,859,180,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,362
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE spice_compat_version_t spice_get_current_compat_version(void) { return SPICE_COMPAT_VERSION_CURRENT; }
99,340,686,765,721,110,000,000,000,000,000,000,000
reds.cpp
235,495,253,173,269,550,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,363
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_add_client(SpiceServer *s, int socket, int skip_auth) { RedLinkInfo *link; RedsStream *stream; spice_assert(reds == s); if (!(link = reds_init_client_connection(socket))) { spice_warning("accept failed"); return -1; } link->skip_auth = skip_a...
86,767,652,069,580,950,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,364
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_add_interface(SpiceServer *s, SpiceBaseInstance *sin) { const SpiceBaseInterface *interface = sin->sif; spice_assert(reds == s); if (strcmp(interface->type, SPICE_INTERFACE_KEYBOARD) == 0) { spice_info("SPICE_INT...
88,893,090,644,406,330,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,365
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_add_ssl_client(SpiceServer *s, int socket, int skip_auth) { RedLinkInfo *link; spice_assert(reds == s); if (!(link = reds_init_client_ssl_connection(socket))) { return -1; } link->skip_auth = skip_auth; return 0; }
151,610,867,433,680,420,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,366
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE const char** spice_server_char_device_recognized_subtypes(void) { return spice_server_char_device_recognized_subtypes_list; }
303,129,388,083,346,270,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,367
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE void spice_server_char_device_wakeup(SpiceCharDeviceInstance* sin) { if (!sin->st) { spice_warning("no SpiceCharDeviceState attached to instance %p", sin); return; } spice_char_device_wakeup(sin->st); }
92,673,826,773,654,600,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,368
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE void spice_server_destroy(SpiceServer *s) { spice_assert(reds == s); reds_exit(); }
9,105,601,002,741,172,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,369
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE spice_image_compression_t spice_server_get_image_compression(SpiceServer *s) { spice_assert(reds == s); return image_compression; }
262,261,663,725,867,100,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,370
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_get_num_clients(SpiceServer *s) { spice_assert(reds == s); return reds_num_of_clients(); }
27,489,738,003,638,950,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,371
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_get_peer_info(SpiceServer *s, struct sockaddr *sa, socklen_t *salen) { spice_assert(reds == s); if (main_channel_getpeername(reds->main_channel, sa, salen) < 0) { return -1; } return 0; }
303,217,298,083,803,570,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,372
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_get_sock_info(SpiceServer *s, struct sockaddr *sa, socklen_t *salen) { spice_assert(reds == s); if (main_channel_getsockname(reds->main_channel, sa, salen) < 0) { return -1; } return 0; }
305,015,728,196,298,360,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,373
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_init(SpiceServer *s, SpiceCoreInterface *core) { int ret; spice_assert(reds == s); ret = do_spice_init(core); if (default_renderer) { red_dispatcher_add_renderer(default_renderer); } return ret; }
269,206,431,763,986,800,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,374
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_is_server_mouse(SpiceServer *s) { spice_assert(reds == s); return reds->mouse_mode == SPICE_MOUSE_MODE_SERVER; }
133,895,451,763,324,950,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,375
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_kbd_leds(SpiceKbdInstance *sin, int leds) { inputs_on_keyboard_leds_change(NULL, leds); return 0; }
276,015,613,851,021,570,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,376
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_migrate_client_state(SpiceServer *s) { spice_assert(reds == s); if (!reds_main_channel_connected()) { return SPICE_MIGRATE_CLIENT_NONE; } else if (reds->mig_wait_connect) { return SPICE_MIGRATE_CLIENT_WAITING; } else { return SPICE_MIGRATE_CLI...
101,865,536,084,751,940,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,377
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_migrate_connect(SpiceServer *s, const char* dest, int port, int secure_port, const char* cert_subject) { SpiceMigrateInterface *sif; int try_seamless; spice_info(NULL)...
159,350,543,767,006,240,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,378
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_migrate_end(SpiceServer *s, int completed) { SpiceMigrateInterface *sif; int ret = 0; spice_info(NULL); spice_assert(migration_interface); spice_assert(reds == s); sif = SPICE_CONTAINEROF(migration_interface->base.sif, SpiceMigrateInterface, base); if (...
308,277,652,063,169,920,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,379
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_migrate_info(SpiceServer *s, const char* dest, int port, int secure_port, const char* cert_subject) { spice_info(NULL); spice_assert(!migration_interface); spice_assert(reds == s); if...
176,437,197,570,506,380,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,380
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_migrate_switch(SpiceServer *s) { spice_assert(reds == s); spice_info(NULL); if (!reds->num_clients) { return 0; } reds->expect_migrate = FALSE; reds_mig_switch(); return 0; }
253,432,749,641,257,800,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,381
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE SpiceServer *spice_server_new(void) { /* we can't handle multiple instances (yet) */ spice_assert(reds == NULL); reds = spice_new0(RedsState, 1); return reds; }
262,107,588,481,650,160,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,382
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE void spice_server_set_addr(SpiceServer *s, const char *addr, int flags) { spice_assert(reds == s); g_strlcpy(spice_addr, addr, sizeof(spice_addr)); if (flags & SPICE_ADDR_FLAG_IPV4_ONLY) { spice_family = PF_INET; } if (flags & SPICE_ADDR_FLAG_IPV6_ONLY) { spice_fam...
218,821,190,751,226,600,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,383
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_agent_copypaste(SpiceServer *s, int enable) { spice_assert(reds == s); agent_copypaste = enable; reds->agent_state.write_filter.copy_paste_enabled = agent_copypaste; reds->agent_state.read_filter.copy_paste_enabled = agent_copypaste; return 0; }
72,028,985,320,289,840,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,384
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_agent_file_xfer(SpiceServer *s, int enable) { spice_assert(reds == s); agent_file_xfer = enable; reds->agent_state.write_filter.file_xfer_enabled = agent_file_xfer; reds->agent_state.read_filter.file_xfer_enabled = agent_file_xfer; return 0; }
67,823,361,048,639,210,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,385
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_channel_security(SpiceServer *s, const char *channel, int security) { static const char *names[] = { [ SPICE_CHANNEL_MAIN ] = "main", [ SPICE_CHANNEL_DISPLAY ] = "display", [ SPICE_CHANNEL_INPUTS ] = "inputs", [ SPICE_CHANNEL_CURSOR ] ...
82,816,467,290,886,680,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,386
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_compat_version(SpiceServer *s, spice_compat_version_t version) { if (version < SPICE_COMPAT_VERSION_0_6) { /* We don't support 0.4 compat mode atm */ return -1; } if (version > SPICE_COMPAT_VERSIO...
92,322,522,005,752,280,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,387
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_exit_on_disconnect(SpiceServer *s, int flag) { spice_assert(reds == s); exit_on_disconnect = !!flag; return 0; }
68,197,038,726,701,780,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,388
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_image_compression(SpiceServer *s, spice_image_compression_t comp) { spice_assert(reds == s); set_image_compression(comp); return 0; }
288,550,308,163,387,740,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,389
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_jpeg_compression(SpiceServer *s, spice_wan_compression_t comp) { spice_assert(reds == s); if (comp == SPICE_WAN_COMPRESSION_INVALID) { spice_error("invalid jpeg state"); return -1; } jpeg_state = comp; return 0; }
285,359,456,275,091,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
12,390
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
0
SPICE_GNUC_VISIBLE int spice_server_set_listen_socket_fd(SpiceServer *s, int listen_fd) { spice_assert(reds == s); spice_listen_socket_fd = listen_fd; return 0; }
12,644,046,157,221,250,000,000,000,000,000,000,000
reds.c
253,596,976,331,707,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282