CVE-2020-25652

A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user could use this flaw to prevent legitimate agents from connecting to the spice-vdagentd daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and prior.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spice-space:spice-vdagent:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-11-26 02:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-25652

Mitre link : CVE-2020-25652

CVE.ORG link : CVE-2020-25652


JSON object : View

Products Affected

spice-space

  • spice-vdagent

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-770

Allocation of Resources Without Limits or Throttling