idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
12,291 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_handle_agent_mouse_event(const VDAgentMouseState *mouse_state)
{
SpiceCharDeviceWriteBuffer *char_dev_buf;
VDInternalBuf *internal_buf;
uint32_t total_msg_size;
if (!inputs_inited() || !reds->agent_state.base) {
return;
}
total_msg_size = sizeof(VDIChunkHeader) + sizeof(VDAge... | 105,637,752,762,884,650,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,292 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_mechanism(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
spice_info("Auth method: %d", link->auth_mechanism.auth_mechanism);
if (link->auth_mechanism.auth_mechanism == SPICE_COMMON_CAP_AUTH_SPICE
&& !sasl_enabled
) {
reds_get_spice_ticket(li... | 15,337,848,544,551,474,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,293 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_mechlen(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
AsyncRead *obj = &link->async_read;
RedsSASL *sasl = &link->stream->sasl;
if (sasl->len < 1 || sasl->len > 100) {
spice_warning("Got bad client mechname len %d", sasl->len);
reds_link_free(li... | 302,616,390,465,038,160,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,294 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_mechname(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
AsyncRead *obj = &link->async_read;
RedsSASL *sasl = &link->stream->sasl;
sasl->mechname[sasl->len] = '\0';
spice_info("Got client mechname '%s' check against '%s'",
sasl->mechname, sasl-... | 67,408,300,172,263,280,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,295 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_sasl_start(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
AsyncRead *obj = &link->async_read;
const char *serverout;
unsigned int serveroutlen;
int err;
char *clientdata = NULL;
RedsSASL *sasl = &link->stream->sasl;
uint32_t datalen = sasl->len;
... | 6,403,374,681,113,668,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,296 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_sasl_step(void *opaque)
{
const char *serverout;
unsigned int serveroutlen;
int err;
char *clientdata = NULL;
RedLinkInfo *link = (RedLinkInfo *)opaque;
RedsSASL *sasl = &link->stream->sasl;
uint32_t datalen = sasl->len;
AsyncRead *obj = &link->async_read;
... | 224,056,774,608,558,030,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,297 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_sasl_steplen(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
AsyncRead *obj = &link->async_read;
RedsSASL *sasl = &link->stream->sasl;
spice_info("Got steplen %d", sasl->len);
if (sasl->len > SASL_DATA_MAX_LEN) {
spice_warning("Too much SASL data %d",... | 22,455,173,760,452,070,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,298 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_auth_startlen(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
AsyncRead *obj = &link->async_read;
RedsSASL *sasl = &link->stream->sasl;
spice_info("Got client start len %d", sasl->len);
if (sasl->len > SASL_DATA_MAX_LEN) {
spice_warning("Too much SASL data... | 141,895,389,034,456,160,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,299 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_handle_channel_event(int event, SpiceChannelEventInfo *info)
{
if (core->base.minor_version >= 3 && core->channel_event != NULL)
core->channel_event(event, info);
if (event == SPICE_CHANNEL_EVENT_DISCONNECTED) {
free(info);
}
}
| 6,327,112,612,440,010,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,300 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_link_error(void *opaque, int err)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
switch (err) {
case 0:
case EPIPE:
break;
default:
spice_warning("%s", strerror(errno));
break;
}
reds_link_free(link);
}
| 70,755,214,595,952,670,000,000,000,000,000,000,000 | reds.cpp | 235,495,253,173,269,550,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,301 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_main_link(RedLinkInfo *link)
{
RedClient *client;
RedsStream *stream;
SpiceLinkMess *link_mess;
uint32_t *caps;
uint32_t connection_id;
MainChannelClient *mcc;
int mig_target = FALSE;
spice_info(NULL);
spice_assert(reds->main_channel);
link_mess = link->... | 328,122,620,684,859,860,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,302 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | int reds_handle_migrate_data(MainChannelClient *mcc, SpiceMigrateDataMain *mig_data, uint32_t size)
{
VDIPortState *agent_state = &reds->agent_state;
/*
* Now that the client has switched to the target server, if main_channel
* controls the mm-time, we update the client's mm-time.
* (MSG_MAIN_IN... | 225,263,967,624,812,820,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,303 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_new_link(RedLinkInfo *link)
{
AsyncRead *obj = &link->async_read;
obj->opaque = link;
obj->stream = link->stream;
obj->now = (uint8_t *)&link->link_header;
obj->end = (uint8_t *)((SpiceLinkHeader *)&link->link_header + 1);
obj->done = reds_handle_read_header_done;
obj... | 270,499,767,257,444,140,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,304 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_other_links(RedLinkInfo *link)
{
RedChannel *channel;
RedClient *client = NULL;
SpiceLinkMess *link_mess;
RedsMigTargetClient *mig_client;
link_mess = link->link_mess;
if (reds->main_channel) {
client = main_channel_get_client_by_link_id(reds->main_channel,
... | 128,714,081,008,727,080,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,305 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_read_header_done(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
SpiceLinkHeader *header = &link->link_header;
AsyncRead *obj = &link->async_read;
if (header->magic != SPICE_MAGIC) {
reds_send_link_error(link, SPICE_LINK_ERR_INVALID_MAGIC);
reds_link_f... | 12,177,488,769,661,625,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,306 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_read_link_done(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
SpiceLinkMess *link_mess = link->link_mess;
AsyncRead *obj = &link->async_read;
uint32_t num_caps = link_mess->num_common_caps + link_mess->num_channel_caps;
uint32_t *caps = (uint32_t *)((uint8_t *)lin... | 95,217,523,403,386,500,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,307 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_ssl_accept(int fd, int event, void *data)
{
RedLinkInfo *link = (RedLinkInfo *)data;
int return_code;
if ((return_code = SSL_accept(link->stream->ssl)) != 1) {
int ssl_error = SSL_get_error(link->stream->ssl, return_code);
if (ssl_error != SSL_ERROR_WANT_READ && ssl_... | 150,051,238,563,088,300,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,308 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | int reds_has_vdagent(void)
{
return !!vdagent;
}
| 61,250,574,637,453,080,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,309 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_info_new_channel(RedLinkInfo *link, int connection_id)
{
spice_info("channel %d:%d, connected successfully, over %s link",
link->link_mess->channel_type,
link->link_mess->channel_id,
link->stream->ssl == NULL ? "Non Secure" : "Secure");
/* add info +... | 333,726,455,128,359,680,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,310 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static RedLinkInfo *reds_init_client_connection(int socket)
{
RedLinkInfo *link;
RedsStream *stream;
int delay_val = 1;
int flags;
if ((flags = fcntl(socket, F_GETFL)) == -1) {
spice_warning("accept failed, %s", strerror(errno));
goto error;
}
if (fcntl(socket, F_SETFL, fla... | 194,765,804,769,429,770,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,311 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static RedLinkInfo *reds_init_client_ssl_connection(int socket)
{
RedLinkInfo *link;
int return_code;
int ssl_error;
BIO *sbio;
link = reds_init_client_connection(socket);
if (link == NULL)
goto error;
if (!(sbio = BIO_new_socket(link->stream->socket, BIO_NOCLOSE))) {
spice... | 234,554,348,981,118,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,312 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_init_net(void)
{
if (spice_port != -1) {
reds->listen_socket = reds_init_socket(spice_addr, spice_port, spice_family);
if (-1 == reds->listen_socket) {
return -1;
}
reds->listen_watch = core->watch_add(reds->listen_socket,
... | 147,135,263,636,513,970,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,313 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_init_ssl(void)
{
#if OPENSSL_VERSION_NUMBER >= 0x10000000L
const SSL_METHOD *ssl_method;
#else
SSL_METHOD *ssl_method;
#endif
int return_code;
long ssl_options = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3;
/* Global system initialization*/
SSL_library_init();
SSL_load_error_strings()... | 183,141,513,247,355,300,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,314 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_link_free(RedLinkInfo *link)
{
reds_stream_free(link->stream);
link->stream = NULL;
free(link->link_mess);
link->link_mess = NULL;
BN_free(link->tiTicketing.bn);
link->tiTicketing.bn = NULL;
if (link->tiTicketing.rsa) {
RSA_free(link->tiTicketing.rsa);
lin... | 100,064,932,290,032,490,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,315 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_link_mig_target_channels(RedClient *client)
{
RedsMigTargetClient *mig_client;
RingItem *item;
spice_info("%p", client);
mig_client = reds_mig_target_client_find(client);
if (!mig_client) {
spice_info("Error: mig target client was not found");
return FALSE;
}
... | 57,158,108,180,204,060,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,316 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_main_channel_connected(void)
{
return main_channel_is_connected(reds->main_channel);
}
| 310,663,762,080,715,030,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,317 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_marshall_migrate_data(SpiceMarshaller *m)
{
SpiceMigrateDataMain mig_data;
VDIPortState *agent_state = &reds->agent_state;
SpiceMarshaller *m2;
memset(&mig_data, 0, sizeof(mig_data));
spice_marshaller_add_uint32(m, SPICE_MIGRATE_DATA_MAIN_MAGIC);
spice_marshaller_add_uint32(m, SPICE_M... | 223,996,550,799,081,440,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,318 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_cleanup(void)
{
if (reds->mig_inprogress) {
if (reds->mig_wait_connect || reds->mig_wait_disconnect) {
SpiceMigrateInterface *sif;
spice_assert(migration_interface);
sif = SPICE_CONTAINEROF(migration_interface->base.sif, SpiceMigrateInterface, base);... | 153,782,643,349,629,780,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,319 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_cleanup_wait_disconnect(void)
{
RingItem *wait_client_item;
while ((wait_client_item = ring_get_tail(&reds->mig_wait_disconnect_clients))) {
RedsMigWaitDisconnectClient *wait_client;
wait_client = SPICE_CONTAINEROF(wait_client_item, RedsMigWaitDisconnectClient, link);
... | 253,403,693,654,985,960,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,320 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_disconnect(void)
{
if (reds_main_channel_connected()) {
reds_disconnect();
} else {
reds_mig_cleanup();
}
}
| 278,240,234,130,696,050,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,321 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_fill_wait_disconnect(void)
{
RingItem *client_item;
spice_assert(reds->num_clients > 0);
/* tracking the clients, in order to ignore disconnection
* of clients that got connected to the src after migration completion.*/
RING_FOREACH(client_item, &reds->clients) {
RedCl... | 115,710,845,163,992,260,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,322 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_finished(int completed)
{
spice_info(NULL);
reds->mig_inprogress = TRUE;
if (reds->src_do_seamless_migrate && completed) {
reds_migrate_channels_seamless();
} else {
main_channel_migrate_src_complete(reds->main_channel, completed);
}
if (completed) {
... | 314,739,547,030,819,020,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,323 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_release(void)
{
if (reds->mig_spice) {
free(reds->mig_spice->cert_subject);
free(reds->mig_spice->host);
free(reds->mig_spice);
reds->mig_spice = NULL;
}
}
| 226,695,303,062,112,430,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,324 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_remove_wait_disconnect_client(RedClient *client)
{
RingItem *wait_client_item;
RING_FOREACH(wait_client_item, &reds->mig_wait_disconnect_clients) {
RedsMigWaitDisconnectClient *wait_client;
wait_client = SPICE_CONTAINEROF(wait_client_item, RedsMigWaitDisconnectClient, link... | 179,623,076,062,898,050,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,325 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_started(void)
{
spice_info(NULL);
spice_assert(reds->mig_spice);
reds->mig_inprogress = TRUE;
reds->mig_wait_connect = TRUE;
core->timer_start(reds->mig_timer, MIGRATE_TIMEOUT);
}
| 419,818,586,049,784,060,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,326 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_switch(void)
{
if (!reds->mig_spice) {
spice_warning("reds_mig_switch called without migrate_info set");
return;
}
main_channel_migrate_switch(reds->main_channel, reds->mig_spice);
reds_mig_release();
}
| 195,602,732,555,559,700,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,327 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_target_client_add_pending_link(RedsMigTargetClient *client,
SpiceLinkMess *link_msg,
RedsStream *stream)
{
RedsMigPendingLink *mig_link;
spice_assert(reds);
spice_assert(client);
... | 121,476,104,397,289,200,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,328 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_target_client_disconnect_all(void)
{
RingItem *now, *next;
RING_FOREACH_SAFE(now, next, &reds->mig_target_clients) {
RedsMigTargetClient *mig_client = SPICE_CONTAINEROF(now, RedsMigTargetClient, link);
reds_client_disconnect(mig_client->client);
}
}
| 76,581,908,409,932,270,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,329 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static RedsMigTargetClient* reds_mig_target_client_find(RedClient *client)
{
RingItem *item;
RING_FOREACH(item, &reds->mig_target_clients) {
RedsMigTargetClient *mig_client;
mig_client = SPICE_CONTAINEROF(item, RedsMigTargetClient, link);
if (mig_client->client == client) {
... | 196,542,163,654,756,800,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,330 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_mig_target_client_free(RedsMigTargetClient *mig_client)
{
RingItem *now, *next;
ring_remove(&mig_client->link);
reds->num_mig_target_clients--;
RING_FOREACH_SAFE(now, next, &mig_client->pending_links) {
RedsMigPendingLink *mig_link = SPICE_CONTAINEROF(now, RedsMigPendingLink, ... | 221,517,275,174,262,600,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,331 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_migrate_channels_seamless(void)
{
RedClient *client;
/* seamless migration is supported for only one client for now */
client = reds_get_client();
red_client_migrate(client);
}
| 260,512,255,240,408,100,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,332 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | int reds_num_of_channels(void)
{
return reds ? reds->num_of_channels : 0;
}
| 307,168,335,850,184,000,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,333 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_char_device_state_destroy(SpiceCharDeviceState *dev)
{
reds_char_device_remove_state(dev);
}
| 334,226,312,422,901,400,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,334 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_main_agent_data(MainChannelClient *mcc, void *message, size_t size)
{
VDIPortState *dev_state = &reds->agent_state;
VDIChunkHeader *header;
int res;
res = agent_msg_filter_process_data(&reds->agent_state.write_filter,
message, size);
switch (res)... | 132,643,246,060,312,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,335 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_on_main_agent_monitors_config(
MainChannelClient *mcc, void *message, size_t size)
{
VDAgentMessage *msg_header;
VDAgentMonitorsConfig *monitors_config;
RedsClientMonitorsConfig *cmc = &reds->client_monitors_config;
cmc->buffer_size += size;
cmc->buffer = realloc(cmc->buffe... | 230,207,907,506,310,950,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,336 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_main_agent_start(MainChannelClient *mcc, uint32_t num_tokens)
{
SpiceCharDeviceState *dev_state = reds->agent_state.base;
RedChannelClient *rcc;
if (!vdagent) {
return;
}
spice_assert(vdagent->st && vdagent->st == dev_state);
rcc = main_channel_client_get_base(mcc);
red... | 225,286,668,636,883,100,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,337 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_main_agent_tokens(MainChannelClient *mcc, uint32_t num_tokens)
{
if (!vdagent) {
return;
}
spice_assert(vdagent->st);
spice_char_device_send_to_client_tokens_add(vdagent->st,
main_channel_client_get_base(mcc)->client,
... | 290,793,708,498,662,350,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,338 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_main_channel_migrate(MainChannelClient *mcc)
{
VDIPortState *agent_state = &reds->agent_state;
uint32_t read_data_len;
spice_assert(reds->num_clients == 1);
if (agent_state->read_state != VDI_PORT_READ_STATE_READ_DATA) {
return;
}
spice_assert(agent_state->current_read_buf... | 141,171,712,407,530,670,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,339 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_main_migrate_connected(int seamless)
{
reds->src_do_seamless_migrate = seamless;
if (reds->mig_wait_connect) {
reds_mig_cleanup();
}
}
| 41,310,022,399,933,650,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,340 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_on_main_mouse_mode_request(void *message, size_t size)
{
switch (((SpiceMsgcMainMouseModeRequest *)message)->mode) {
case SPICE_MOUSE_MODE_CLIENT:
if (reds->is_client_mouse_allowed) {
reds_set_mouse_mode(SPICE_MOUSE_MODE_CLIENT);
} else {
spice_info("client mous... | 320,898,982,856,757,830,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,341 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | int reds_on_migrate_dst_set_seamless(MainChannelClient *mcc, uint32_t src_version)
{
/* seamless migration is not supported with multiple clients*/
if (reds->allow_multiple_clients || src_version > SPICE_MIGRATION_PROTOCOL_VERSION) {
reds->dst_do_seamless_migrate = FALSE;
} else {
RedChanne... | 268,069,831,142,608,900,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,342 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_register_channel(RedChannel *channel)
{
spice_assert(reds);
ring_add(&reds->channels, &channel->link);
reds->num_of_channels++;
}
| 156,759,772,595,633,120,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,343 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_release_agent_data_buffer(uint8_t *buf)
{
VDIPortState *dev_state = &reds->agent_state;
if (!dev_state->recv_from_client_buf) {
free(buf);
return;
}
spice_assert(buf == dev_state->recv_from_client_buf->buf + sizeof(VDIChunkHeader));
if (!dev_state->recv_from_client_buf_pu... | 338,270,155,623,274,560,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,344 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_reset_vdp(void)
{
VDIPortState *state = &reds->agent_state;
SpiceCharDeviceInterface *sif;
state->read_state = VDI_PORT_READ_STATE_READ_HEADER;
state->receive_pos = (uint8_t *)&state->vdi_chunk_header;
state->receive_len = sizeof(state->vdi_chunk_header);
state->message_receive... | 326,472,338,430,636,040,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,345 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_send_link_ack(RedLinkInfo *link)
{
SpiceLinkHeader header;
SpiceLinkReply ack;
RedChannel *channel;
RedChannelCapabilities *channel_caps;
BUF_MEM *bmBuf;
BIO *bio;
int ret = FALSE;
header.magic = SPICE_MAGIC;
header.size = sizeof(ack);
header.major_version = SPIC... | 9,336,435,603,395,351,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,346 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_send_link_error(RedLinkInfo *link, uint32_t error)
{
SpiceLinkHeader header;
SpiceLinkReply reply;
header.magic = SPICE_MAGIC;
header.size = sizeof(reply);
header.major_version = SPICE_VERSION_MAJOR;
header.minor_version = SPICE_VERSION_MINOR;
memset(&reply, 0, sizeof(reply)... | 260,665,153,638,861,240,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,347 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_send_link_result(RedLinkInfo *link, uint32_t error)
{
sync_write(link->stream, &error, sizeof(error));
}
| 18,939,895,681,443,420,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,348 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_send_mm_time(void)
{
if (!reds_main_channel_connected()) {
return;
}
spice_debug(NULL);
main_channel_push_multi_media_time(reds->main_channel,
reds_get_mm_time() - reds->mm_time_latency);
}
| 135,470,914,480,566,770,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,349 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_set_client_mm_time_latency(RedClient *client, uint32_t latency)
{
if (reds->mm_timer_enabled) {
if (latency > reds->mm_time_latency) {
reds->mm_time_latency = latency;
reds_send_mm_time();
} else {
spice_debug("new latency %u is smaller than existing %u"... | 316,376,568,721,092,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,350 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | void reds_set_client_mouse_allowed(int is_client_mouse_allowed, int x_res, int y_res)
{
reds->monitor_mode.x_res = x_res;
reds->monitor_mode.y_res = y_res;
reds->dispatcher_allows_client_mouse = is_client_mouse_allowed;
reds_update_mouse_mode();
if (reds->is_client_mouse_allowed && inputs_has_tablet... | 143,623,565,698,009,750,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,351 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static int reds_set_migration_dest_info(const char* dest,
int port, int secure_port,
const char* cert_subject)
{
RedsMigSpice *spice_migration = NULL;
reds_mig_release();
if ((port == -1 && secure_port == -1) || !dest) {
... | 256,702,386,025,596,840,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,352 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_set_mouse_mode(uint32_t mode)
{
if (reds->mouse_mode == mode) {
return;
}
reds->mouse_mode = mode;
red_dispatcher_set_mouse_mode(reds->mouse_mode);
main_channel_push_mouse_mode(reds->main_channel, reds->mouse_mode, reds->is_client_mouse_allowed);
}
| 183,832,397,145,933,400,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,353 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_start_auth_sasl(RedLinkInfo *link)
{
const char *mechlist = NULL;
sasl_security_properties_t secprops;
int err;
char *localAddr, *remoteAddr;
int mechlistlen;
AsyncRead *obj = &link->async_read;
RedsSASL *sasl = &link->stream->sasl;
/* Get local & remote client addresse... | 128,891,806,341,556,050,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,354 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_stream_push_channel_event(RedsStream *s, int event)
{
main_dispatcher_channel_event(event, s->info);
}
| 307,267,290,373,384,350,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,355 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | ssize_t reds_stream_read(RedsStream *s, void *buf, size_t nbyte)
{
ssize_t ret;
#if HAVE_SASL
if (s->sasl.conn && s->sasl.runSSF) {
ret = reds_stream_sasl_read(s, buf, nbyte);
} else
#endif
ret = s->read(s, buf, nbyte);
return ret;
}
| 276,220,860,867,197,100,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,356 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_stream_remove_watch(RedsStream* s)
{
if (s->watch) {
core->watch_remove(s->watch);
s->watch = NULL;
}
}
| 282,606,353,661,897,500,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,357 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | ssize_t reds_stream_write(RedsStream *s, const void *buf, size_t nbyte)
{
ssize_t ret;
#if HAVE_SASL
if (s->sasl.conn && s->sasl.runSSF) {
ret = reds_stream_sasl_write(s, buf, nbyte);
} else
#endif
ret = s->write(s, buf, nbyte);
return ret;
}
| 279,686,072,305,287,700,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,358 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | ssize_t reds_stream_writev(RedsStream *s, const struct iovec *iov, int iovcnt)
{
int i;
int n;
ssize_t ret = 0;
if (s->writev != NULL) {
return s->writev(s, iov, iovcnt);
}
for (i = 0; i < iovcnt; ++i) {
n = reds_stream_write(s, iov[i].iov_base, iov[i].iov_len);
if (n <... | 64,118,521,042,019,140,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,359 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_update_mouse_mode(void)
{
int allowed = 0;
int qxl_count = red_dispatcher_qxl_count();
if ((agent_mouse && vdagent) || (inputs_has_tablet() && qxl_count == 1)) {
allowed = reds->dispatcher_allows_client_mouse;
}
if (allowed == reds->is_client_mouse_allowed) {
return... | 85,353,159,508,226,800,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,360 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void set_image_compression(spice_image_compression_t val)
{
if (val == image_compression) {
return;
}
image_compression = val;
red_dispatcher_on_ic_change();
}
| 197,286,967,308,798,240,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,361 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void set_one_channel_security(int id, uint32_t security)
{
ChannelSecurityOptions *security_options;
if ((security_options = find_channel_security(id))) {
security_options->options = security;
return;
}
security_options = spice_new(ChannelSecurityOptions, 1);
security_options... | 128,191,811,357,859,180,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,362 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE spice_compat_version_t spice_get_current_compat_version(void)
{
return SPICE_COMPAT_VERSION_CURRENT;
}
| 99,340,686,765,721,110,000,000,000,000,000,000,000 | reds.cpp | 235,495,253,173,269,550,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,363 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_add_client(SpiceServer *s, int socket, int skip_auth)
{
RedLinkInfo *link;
RedsStream *stream;
spice_assert(reds == s);
if (!(link = reds_init_client_connection(socket))) {
spice_warning("accept failed");
return -1;
}
link->skip_auth = skip_a... | 86,767,652,069,580,950,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,364 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_add_interface(SpiceServer *s,
SpiceBaseInstance *sin)
{
const SpiceBaseInterface *interface = sin->sif;
spice_assert(reds == s);
if (strcmp(interface->type, SPICE_INTERFACE_KEYBOARD) == 0) {
spice_info("SPICE_INT... | 88,893,090,644,406,330,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,365 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_add_ssl_client(SpiceServer *s, int socket, int skip_auth)
{
RedLinkInfo *link;
spice_assert(reds == s);
if (!(link = reds_init_client_ssl_connection(socket))) {
return -1;
}
link->skip_auth = skip_auth;
return 0;
}
| 151,610,867,433,680,420,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,366 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE const char** spice_server_char_device_recognized_subtypes(void)
{
return spice_server_char_device_recognized_subtypes_list;
}
| 303,129,388,083,346,270,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,367 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE void spice_server_char_device_wakeup(SpiceCharDeviceInstance* sin)
{
if (!sin->st) {
spice_warning("no SpiceCharDeviceState attached to instance %p", sin);
return;
}
spice_char_device_wakeup(sin->st);
}
| 92,673,826,773,654,600,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,368 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE void spice_server_destroy(SpiceServer *s)
{
spice_assert(reds == s);
reds_exit();
}
| 9,105,601,002,741,172,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,369 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE spice_image_compression_t spice_server_get_image_compression(SpiceServer *s)
{
spice_assert(reds == s);
return image_compression;
}
| 262,261,663,725,867,100,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,370 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_get_num_clients(SpiceServer *s)
{
spice_assert(reds == s);
return reds_num_of_clients();
}
| 27,489,738,003,638,950,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,371 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_get_peer_info(SpiceServer *s, struct sockaddr *sa, socklen_t *salen)
{
spice_assert(reds == s);
if (main_channel_getpeername(reds->main_channel, sa, salen) < 0) {
return -1;
}
return 0;
}
| 303,217,298,083,803,570,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,372 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_get_sock_info(SpiceServer *s, struct sockaddr *sa, socklen_t *salen)
{
spice_assert(reds == s);
if (main_channel_getsockname(reds->main_channel, sa, salen) < 0) {
return -1;
}
return 0;
}
| 305,015,728,196,298,360,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,373 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_init(SpiceServer *s, SpiceCoreInterface *core)
{
int ret;
spice_assert(reds == s);
ret = do_spice_init(core);
if (default_renderer) {
red_dispatcher_add_renderer(default_renderer);
}
return ret;
}
| 269,206,431,763,986,800,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,374 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_is_server_mouse(SpiceServer *s)
{
spice_assert(reds == s);
return reds->mouse_mode == SPICE_MOUSE_MODE_SERVER;
}
| 133,895,451,763,324,950,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,375 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_kbd_leds(SpiceKbdInstance *sin, int leds)
{
inputs_on_keyboard_leds_change(NULL, leds);
return 0;
}
| 276,015,613,851,021,570,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,376 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_migrate_client_state(SpiceServer *s)
{
spice_assert(reds == s);
if (!reds_main_channel_connected()) {
return SPICE_MIGRATE_CLIENT_NONE;
} else if (reds->mig_wait_connect) {
return SPICE_MIGRATE_CLIENT_WAITING;
} else {
return SPICE_MIGRATE_CLI... | 101,865,536,084,751,940,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,377 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_migrate_connect(SpiceServer *s, const char* dest,
int port, int secure_port,
const char* cert_subject)
{
SpiceMigrateInterface *sif;
int try_seamless;
spice_info(NULL)... | 159,350,543,767,006,240,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,378 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_migrate_end(SpiceServer *s, int completed)
{
SpiceMigrateInterface *sif;
int ret = 0;
spice_info(NULL);
spice_assert(migration_interface);
spice_assert(reds == s);
sif = SPICE_CONTAINEROF(migration_interface->base.sif, SpiceMigrateInterface, base);
if (... | 308,277,652,063,169,920,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,379 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_migrate_info(SpiceServer *s, const char* dest,
int port, int secure_port,
const char* cert_subject)
{
spice_info(NULL);
spice_assert(!migration_interface);
spice_assert(reds == s);
if... | 176,437,197,570,506,380,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,380 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_migrate_switch(SpiceServer *s)
{
spice_assert(reds == s);
spice_info(NULL);
if (!reds->num_clients) {
return 0;
}
reds->expect_migrate = FALSE;
reds_mig_switch();
return 0;
}
| 253,432,749,641,257,800,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,381 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE SpiceServer *spice_server_new(void)
{
/* we can't handle multiple instances (yet) */
spice_assert(reds == NULL);
reds = spice_new0(RedsState, 1);
return reds;
}
| 262,107,588,481,650,160,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,382 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE void spice_server_set_addr(SpiceServer *s, const char *addr, int flags)
{
spice_assert(reds == s);
g_strlcpy(spice_addr, addr, sizeof(spice_addr));
if (flags & SPICE_ADDR_FLAG_IPV4_ONLY) {
spice_family = PF_INET;
}
if (flags & SPICE_ADDR_FLAG_IPV6_ONLY) {
spice_fam... | 218,821,190,751,226,600,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,383 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_agent_copypaste(SpiceServer *s, int enable)
{
spice_assert(reds == s);
agent_copypaste = enable;
reds->agent_state.write_filter.copy_paste_enabled = agent_copypaste;
reds->agent_state.read_filter.copy_paste_enabled = agent_copypaste;
return 0;
}
| 72,028,985,320,289,840,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,384 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_agent_file_xfer(SpiceServer *s, int enable)
{
spice_assert(reds == s);
agent_file_xfer = enable;
reds->agent_state.write_filter.file_xfer_enabled = agent_file_xfer;
reds->agent_state.read_filter.file_xfer_enabled = agent_file_xfer;
return 0;
}
| 67,823,361,048,639,210,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,385 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_channel_security(SpiceServer *s, const char *channel, int security)
{
static const char *names[] = {
[ SPICE_CHANNEL_MAIN ] = "main",
[ SPICE_CHANNEL_DISPLAY ] = "display",
[ SPICE_CHANNEL_INPUTS ] = "inputs",
[ SPICE_CHANNEL_CURSOR ] ... | 82,816,467,290,886,680,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,386 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_compat_version(SpiceServer *s,
spice_compat_version_t version)
{
if (version < SPICE_COMPAT_VERSION_0_6) {
/* We don't support 0.4 compat mode atm */
return -1;
}
if (version > SPICE_COMPAT_VERSIO... | 92,322,522,005,752,280,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,387 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_exit_on_disconnect(SpiceServer *s, int flag)
{
spice_assert(reds == s);
exit_on_disconnect = !!flag;
return 0;
}
| 68,197,038,726,701,780,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,388 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_image_compression(SpiceServer *s,
spice_image_compression_t comp)
{
spice_assert(reds == s);
set_image_compression(comp);
return 0;
}
| 288,550,308,163,387,740,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,389 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_jpeg_compression(SpiceServer *s, spice_wan_compression_t comp)
{
spice_assert(reds == s);
if (comp == SPICE_WAN_COMPRESSION_INVALID) {
spice_error("invalid jpeg state");
return -1;
}
jpeg_state = comp;
return 0;
}
| 285,359,456,275,091,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
12,390 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | SPICE_GNUC_VISIBLE int spice_server_set_listen_socket_fd(SpiceServer *s, int listen_fd)
{
spice_assert(reds == s);
spice_listen_socket_fd = listen_fd;
return 0;
}
| 12,644,046,157,221,250,000,000,000,000,000,000,000 | reds.c | 253,596,976,331,707,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.