Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-23793: GitHub - zelat/spice-security-issues

An issue was discovered in spice-server spice-server-0.14.0-6.el7_6.1.x86_64 of Redhat’s VDI product. There is a security vulnerablility that can restart KVMvirtual machine without any authorization. It is not yet known if there will be other other effects.

CVE
#vulnerability#mac#linux#git#auth#rpm

Spice-Security-Issues

I found a security issue on spice Server when I was fuzzing Spice server.

Introduce

A handshake is required before the spice-server and spice-client can establish communication, spice-client will send a request containing some information that the server needs. This TCP request requires only host and port. So I constructed a malformed TCP packet that caused the vm to crash and the QEMu-KVM process to be restarted.

How to run

#1. Send a malformed TCP packet(Observe the packets intercepted by Wirshark) #2. check qemu-kvm process && kvm instance state

Before sending a malformed TCP packet
After sending a malformed TCP packet

#3. Check libvirt’s log that the virtual machine crashed #4. Observe the virtual machine through virt-manage, found that the virtual machine has been restarted

Vulnerability Code

Code Address: https://gitlab.freedesktop.org/spice/spice/-/blob/master/server/red-stream.cpp
Function:async_read_handler Description: The function async_READ_handler caused a deadlock while processing the data stream.

Related component version

Centos: Linux version 3.10.0-957.10.2.el7.x86_64
Qemu-kvm: QEMU emulator version 2.10.0(qemu-kvm-ev-2.10.0-21.el7_5.7.1)
Spice-server rpm: spice-server-0.14.0-6.el7_6.1.x86_64

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907