Vulnerability Details : CVE-2020-25651
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
Vulnerability category: Denial of serviceInformation leak
Products affected by CVE-2020-25651
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:a:spice-space:spice-vdagent:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-25651
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-25651
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:P |
3.4
|
4.9
|
NIST | |
6.4
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L |
1.1
|
4.7
|
NIST |
CWE ids for CVE-2020-25651
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: secalert@redhat.com (Primary)
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2020-25651
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GQT56LATVTB2DJOVVJOKQVMVUXYCT2VB/
[SECURITY] Fedora 32 Update: spice-vdagent-0.21.0-1.fc32 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIWJ2EIQXWEA2VDBODEATHAT37X4CREP/
[SECURITY] Fedora 33 Update: spice-vdagent-0.21.0-1.fc33 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html
[SECURITY] [DLA 2524-1] spice-vdagent security updateMailing List;Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2020/11/04/1
oss-security - Security Issues in the spice-vdagentd daemonExploit;Mailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1886359
1886359 – (CVE-2020-25651) CVE-2020-25651 spice-vdagent: possible file transfer DoS and information leak via `active_xfers` hash mapIssue Tracking;Patch;Third Party Advisory
Jump to