ID CVE-2021-20201
Summary A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
References
Vulnerable Configurations
  • cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.4:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.5:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.5:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.6:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.6:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.7:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.7:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.12.8:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.12.8:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.13.3:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.13.3:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.13.90:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.13.90:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.13.91:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.13.91:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:spice_project:spice:0.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:spice_project:spice:0.14.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 21-10-2022 - 20:02)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
Last major update 21-10-2022 - 20:02
Published 28-05-2021 - 11:15
Last modified 21-10-2022 - 20:02
Back to Top