Vulnerability Details : CVE-2010-2792
Race condition in the SPICE (aka spice-xpi) plug-in 2.2 for Firefox allows local users to obtain sensitive information, and conduct man-in-the-middle attacks, by providing a UNIX socket for communication between this plug-in and the client (aka qspice-client) in qspice 0.3.0, and then accessing this socket.
Exploit prediction scoring system (EPSS) score for CVE-2010-2792
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2792
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
3.4
|
4.9
|
NIST |
CWE ids for CVE-2010-2792
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2792
-
http://www.securityfocus.com/bid/42711
Red Hat qspice-client Race Condition Vulnerability
-
http://www.vupen.com/english/advisories/2010/2181
Webmail | OVH- OVH
-
https://bugzilla.redhat.com/show_bug.cgi?id=620350
620350 – (CVE-2010-2792) CVE-2010-2792 spice-xpi/qspice-client unix socket race
-
http://www.redhat.com/support/errata/RHSA-2010-0632.html
SupportPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0651.html
SupportPatch;Vendor Advisory
Products affected by CVE-2010-2792
- cpe:2.3:a:redhat:spice-xpi:2.2:*:*:*:*:*:*:*