spice_project CVE Vulnerabilities & Metrics

Focus on spice_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About spice_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with spice_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total spice_project CVEs: 13
Earliest CVE date: 20 Aug 2013, 22:55 UTC
Latest CVE date: 28 May 2021, 11:15 UTC

Latest CVE reference: CVE-2021-20201

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical spice_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.95

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 11
7.0-8.9 1
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS spice_project CVEs

These are the five CVEs with the highest CVSS scores for spice_project, sorted by severity first and recency.

All CVEs for spice_project

CVE-2021-20201 spice_project vulnerability CVSS: 5.0 28 May 2021, 11:15 UTC

A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.

CVE-2020-14355 spice_project vulnerability CVSS: 6.5 07 Oct 2020, 15:15 UTC

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.

CVE-2019-3813 spice_project vulnerability CVSS: 5.4 04 Feb 2019, 18:29 UTC

Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.

CVE-2018-10893 spice_project vulnerability CVSS: 6.5 11 Sep 2018, 15:29 UTC

Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.

CVE-2018-10873 spice_project vulnerability CVSS: 6.5 17 Aug 2018, 12:29 UTC

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.

CVE-2016-9578 spice_project vulnerability CVSS: 5.0 27 Jul 2018, 21:29 UTC

A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.

CVE-2016-9577 spice_project vulnerability CVSS: 6.5 27 Jul 2018, 20:29 UTC

A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.

CVE-2017-7506 spice_project vulnerability CVSS: 6.5 18 Jul 2017, 15:29 UTC

spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.

CVE-2016-2150 spice_project vulnerability CVSS: 3.6 09 Jun 2016, 16:59 UTC

SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.

CVE-2016-0749 spice_project vulnerability CVSS: 10.0 09 Jun 2016, 16:59 UTC

The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.

CVE-2015-5261 spice_project vulnerability CVSS: 3.6 07 Jun 2016, 14:06 UTC

Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.

CVE-2015-5260 spice_project vulnerability CVSS: 7.2 07 Jun 2016, 14:06 UTC

Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.

CVE-2015-3247 spice_project vulnerability CVSS: 6.9 08 Sep 2015, 15:59 UTC

Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.

CVE-2013-4282 spice_project vulnerability CVSS: 5.0 02 Nov 2013, 19:55 UTC

Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.

CVE-2013-4130 spice_project vulnerability CVSS: 5.0 20 Aug 2013, 22:55 UTC

The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.