Search criteria

18 vulnerabilities found for vino by david_king

FKIE_CVE-2013-5745

Vulnerability from fkie_nvd - Published: 2013-10-01 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
Impacted products
Vendor Product Version
david_king vino *
david_king vino 0.12
david_king vino 0.14
david_king vino 2.7
david_king vino 2.7.3
david_king vino 2.7.3.1
david_king vino 2.7.4
david_king vino 2.7.4.90
david_king vino 2.7.4.91
david_king vino 2.7.90
david_king vino 2.7.91
david_king vino 2.7.92
david_king vino 2.8
david_king vino 2.8.0
david_king vino 2.8.0.1
david_king vino 2.8.1
david_king vino 2.9
david_king vino 2.9.2
david_king vino 2.10
david_king vino 2.11
david_king vino 2.11.1
david_king vino 2.11.1.1
david_king vino 2.11.1.2
david_king vino 2.11.90
david_king vino 2.11.92
david_king vino 2.12
david_king vino 2.13
david_king vino 2.13.5
david_king vino 2.14
david_king vino 2.15
david_king vino 2.16
david_king vino 2.17
david_king vino 2.17.2
david_king vino 2.17.4
david_king vino 2.17.5
david_king vino 2.17.92
david_king vino 2.18
david_king vino 2.18.1
david_king vino 2.19
david_king vino 2.19.5
david_king vino 2.19.90
david_king vino 2.19.92
david_king vino 2.20
david_king vino 2.20.1
david_king vino 2.21
david_king vino 2.21.1
david_king vino 2.21.2
david_king vino 2.21.3
david_king vino 2.21.90
david_king vino 2.21.91
david_king vino 2.21.92
david_king vino 2.22
david_king vino 2.22.1
david_king vino 2.22.2
david_king vino 2.23
david_king vino 2.23.5
david_king vino 2.23.90
david_king vino 2.23.91
david_king vino 2.23.92
david_king vino 2.24
david_king vino 2.24.1
david_king vino 2.25
david_king vino 2.25.3
david_king vino 2.25.4
david_king vino 2.25.5
david_king vino 2.25.90
david_king vino 2.25.91
david_king vino 2.25.92
david_king vino 2.26
david_king vino 2.26.1
david_king vino 2.26.2
david_king vino 2.27
david_king vino 2.27.5
david_king vino 2.27.90
david_king vino 2.27.91
david_king vino 2.27.92
david_king vino 2.28
david_king vino 2.28.1
david_king vino 2.28.2
david_king vino 2.28.3
david_king vino 2.31.4
david_king vino 2.31.91
david_king vino 2.32.0
david_king vino 2.32.1
david_king vino 2.32.2
david_king vino 2.99.0
david_king vino 2.99.1
david_king vino 2.99.2
david_king vino 2.99.3
david_king vino 2.99.4
david_king vino 2.99.5
david_king vino 3.0.0
david_king vino 3.0.1
david_king vino 3.0.2
david_king vino 3.0.3
david_king vino 3.1
david_king vino 3.1.1
david_king vino 3.1.2
david_king vino 3.1.3
david_king vino 3.1.4
david_king vino 3.1.5
david_king vino 3.1.90
david_king vino 3.1.91
david_king vino 3.1.92
david_king vino 3.2.0
david_king vino 3.2.1
david_king vino 3.2.2
david_king vino 3.3.1
david_king vino 3.3.3
david_king vino 3.3.92
david_king vino 3.4.0
david_king vino 3.4.1
david_king vino 3.4.2
david_king vino 3.5.2
david_king vino 3.5.90
david_king vino 3.5.92
david_king vino 3.6.0
david_king vino 3.6.1
david_king vino 3.6.2
canonical ubuntu_linux 12.04
canonical ubuntu_linux 12.10
canonical ubuntu_linux 13.04

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD2A524-DE56-4CF6-9C2D-B4507380696B",
              "versionEndIncluding": "3.7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "684BA3AA-8858-4C04-89E1-FF379FBF9BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68804C21-E455-4107-817F-34E877CC63E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8EEC2E-2051-4B1B-856D-F0AF0CB63993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F58B0BB-0662-4CB5-8C40-EFB08FBD02EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8FD528-3E50-4956-88ED-73F26F2978BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0387A219-D5EB-489B-BCF5-BFDD771EA15F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4E4BFAD-B66B-478A-940C-CBABD7C0EF26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F33E80-8A2A-4391-9683-C12553FB6FE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAABD80A-61A4-4858-8DB3-F7B677879E02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CAE2EFC-75A5-4B4E-BA67-F1E781A56E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A23DA576-C113-410A-BA6E-4ABF5C0DC3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.5.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6FB40B0-CF82-44BC-BA60-A427EF4E6C16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.5.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F02E59-1E5D-4ACF-AA21-F4210E019B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB40778-70B6-4FD1-9EBB-F29F33D2009C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F76A5AA-8CAA-453C-B053-0FF739C59BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3358E6AE-AA6D-4B60-8E9D-D23652D792FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
              "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n vino_client_data_pending en vino-server.c de GNOME Vino 2.26.1, 2.32.1, 3.7.3 y anteriores, y 3.8 cuando el cifrado esta deshabilitado, no limpia los datos del cliente apropiadamente cuando un error causa que la conexi\u00f3n se cierre durante una autenticaci\u00f3n, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU y memoria) a trav\u00e9s de m\u00faltiples peticiones manipuladas durante la autenticaci\u00f3n."
    }
  ],
  "id": "CVE-2013-5745",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-10-01T17:55:03.727",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55090"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1980-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1980-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1165

Vulnerability from fkie_nvd - Published: 2013-03-12 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
Impacted products
Vendor Product Version
david_king vino *
david_king vino 0.12
david_king vino 0.14
david_king vino 2.7
david_king vino 2.7.3
david_king vino 2.7.3.1
david_king vino 2.7.4
david_king vino 2.7.4.90
david_king vino 2.7.4.91
david_king vino 2.7.90
david_king vino 2.7.91
david_king vino 2.7.92
david_king vino 2.8
david_king vino 2.8.0
david_king vino 2.8.0.1
david_king vino 2.8.1
david_king vino 2.9
david_king vino 2.9.2
david_king vino 2.10
david_king vino 2.11
david_king vino 2.11.1
david_king vino 2.11.1.1
david_king vino 2.11.1.2
david_king vino 2.11.90
david_king vino 2.11.92
david_king vino 2.12
david_king vino 2.13
david_king vino 2.13.5
david_king vino 2.14
david_king vino 2.15
david_king vino 2.16
david_king vino 2.17
david_king vino 2.17.2
david_king vino 2.17.4
david_king vino 2.17.5
david_king vino 2.17.92
david_king vino 2.18
david_king vino 2.18.1
david_king vino 2.19
david_king vino 2.19.5
david_king vino 2.19.90
david_king vino 2.19.92
david_king vino 2.20
david_king vino 2.20.1
david_king vino 2.21
david_king vino 2.21.1
david_king vino 2.21.2
david_king vino 2.21.3
david_king vino 2.21.90
david_king vino 2.21.91
david_king vino 2.21.92
david_king vino 2.22
david_king vino 2.22.1
david_king vino 2.22.2
david_king vino 2.23
david_king vino 2.23.5
david_king vino 2.23.90
david_king vino 2.23.91
david_king vino 2.23.92
david_king vino 2.24
david_king vino 2.24.1
david_king vino 2.25
david_king vino 2.25.3
david_king vino 2.25.4
david_king vino 2.25.5
david_king vino 2.25.90
david_king vino 2.25.91
david_king vino 2.25.92
david_king vino 2.26
david_king vino 2.26.1
david_king vino 2.26.2
david_king vino 2.27
david_king vino 2.27.5
david_king vino 2.27.90
david_king vino 2.27.91
david_king vino 2.27.92
david_king vino 2.28
david_king vino 2.28.1
david_king vino 2.28.2
david_king vino 2.28.3
david_king vino 2.31.4
david_king vino 2.31.91
david_king vino 2.32.0
david_king vino 2.32.1
david_king vino 2.32.2
david_king vino 2.99.0
david_king vino 2.99.1
david_king vino 2.99.2
david_king vino 2.99.3
david_king vino 2.99.4
david_king vino 2.99.5
david_king vino 3.0.0
david_king vino 3.0.1
david_king vino 3.0.2
david_king vino 3.0.3
david_king vino 3.1
david_king vino 3.1.1
david_king vino 3.1.2
david_king vino 3.1.3
david_king vino 3.1.4
david_king vino 3.1.5
david_king vino 3.1.90
david_king vino 3.1.91

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE94F71C-7189-4411-94DA-30F6564EA85C",
              "versionEndIncluding": "3.1.92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks."
    },
    {
      "lang": "es",
      "value": "Vino, posiblemente versiones anterior a 3.2, no documenta adecuadamente que abre puertos en enrutadores UPnP cuando se activa la opci\u00f3n  \"Configure network to automatically accept connections\", lo que podr\u00eda facilitar a atacantes remotos llevar a cabo otro tipo de ataques."
    }
  ],
  "id": "CVE-2011-1165",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-12T23:55:01.283",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1164

Vulnerability from fkie_nvd - Published: 2013-03-12 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
Impacted products
Vendor Product Version
david_king vino *
david_king vino 2.7
david_king vino 2.7.3
david_king vino 2.7.3.1
david_king vino 2.7.4
david_king vino 2.7.4.90
david_king vino 2.7.4.91
david_king vino 2.7.90
david_king vino 2.7.91
david_king vino 2.7.92
david_king vino 2.8
david_king vino 2.8.0
david_king vino 2.8.0.1
david_king vino 2.8.1
david_king vino 2.9
david_king vino 2.9.2
david_king vino 2.10
david_king vino 2.11
david_king vino 2.11.1
david_king vino 2.11.1.1
david_king vino 2.11.1.2
david_king vino 2.11.90
david_king vino 2.11.92
david_king vino 2.12
david_king vino 2.13
david_king vino 2.13.5
david_king vino 2.14
david_king vino 2.15
david_king vino 2.16
david_king vino 2.17
david_king vino 2.17.2
david_king vino 2.17.4
david_king vino 2.17.5
david_king vino 2.17.92
david_king vino 2.18
david_king vino 2.18.1
david_king vino 2.19
david_king vino 2.19.5
david_king vino 2.19.90
david_king vino 2.19.92
david_king vino 2.20
david_king vino 2.20.1
david_king vino 2.21
david_king vino 2.21.1
david_king vino 2.21.2
david_king vino 2.21.3
david_king vino 2.21.90
david_king vino 2.21.91
david_king vino 2.21.92
david_king vino 2.22
david_king vino 2.22.1
david_king vino 2.22.2
david_king vino 2.23
david_king vino 2.23.5
david_king vino 2.23.90
david_king vino 2.23.91
david_king vino 2.23.92
david_king vino 2.24
david_king vino 2.24.1
david_king vino 2.25
david_king vino 2.25.3
david_king vino 2.25.4
david_king vino 2.25.5
david_king vino 2.25.90
david_king vino 2.25.91
david_king vino 2.25.92
david_king vino 2.26
david_king vino 2.26.1
david_king vino 2.26.2
david_king vino 2.27
david_king vino 2.27.5
david_king vino 2.27.90
david_king vino 2.27.91
david_king vino 2.27.92
david_king vino 2.28
david_king vino 2.28.1
david_king vino 2.28.2
david_king vino 2.28.3
david_king vino 2.31.4
david_king vino 2.31.91
david_king vino 2.32.0
david_king vino 2.32.1
david_king vino 2.32.2
david_king vino 2.99.0
david_king vino 2.99.1
david_king vino 2.99.2
david_king vino 2.99.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "262D3C13-9D57-4B56-A91F-5B0EE7FC4057",
              "versionEndIncluding": "2.99.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks."
    },
    {
      "lang": "es",
      "value": "Vino anterior a v2.99.4 se puede conectar a redes externas contrarias a la establecida en el cuadro de preferencias de vino (vino-preferences), lo que podr\u00eda hacer m\u00e1s f\u00e1cil para los atacantes remotos a la hora de realizar ataques."
    }
  ],
  "id": "CVE-2011-1164",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-12T23:55:01.230",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-4429

Vulnerability from fkie_nvd - Published: 2012-10-01 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
Impacted products
Vendor Product Version
david_king vino *
david_king vino 0.12
david_king vino 0.14
david_king vino 2.7
david_king vino 2.7.3
david_king vino 2.7.3.1
david_king vino 2.7.4
david_king vino 2.7.90
david_king vino 2.7.91
david_king vino 2.7.92
david_king vino 2.8
david_king vino 2.8.0
david_king vino 2.8.0.1
david_king vino 2.8.1
david_king vino 2.9
david_king vino 2.9.2
david_king vino 2.10
david_king vino 2.11
david_king vino 2.11.1
david_king vino 2.11.1.1
david_king vino 2.11.1.2
david_king vino 2.11.90
david_king vino 2.11.92
david_king vino 2.12
david_king vino 2.13
david_king vino 2.13.5
david_king vino 2.14
david_king vino 2.15
david_king vino 2.16
david_king vino 2.17
david_king vino 2.17.2
david_king vino 2.17.4
david_king vino 2.17.5
david_king vino 2.17.92
david_king vino 2.18
david_king vino 2.18.1
david_king vino 2.19
david_king vino 2.19.5
david_king vino 2.19.90
david_king vino 2.19.92
david_king vino 2.20
david_king vino 2.20.1
david_king vino 2.21
david_king vino 2.21.1
david_king vino 2.21.2
david_king vino 2.21.3
david_king vino 2.21.90
david_king vino 2.21.91
david_king vino 2.21.92
david_king vino 2.22
david_king vino 2.22.1
david_king vino 2.22.2
david_king vino 2.23
david_king vino 2.23.5
david_king vino 2.23.90
david_king vino 2.23.91
david_king vino 2.23.92
david_king vino 2.24
david_king vino 2.24.1
david_king vino 2.25
david_king vino 2.25.3
david_king vino 2.25.4
david_king vino 2.25.5
david_king vino 2.25.90
david_king vino 2.25.91
david_king vino 2.25.92
david_king vino 2.26
david_king vino 2.26.1
david_king vino 2.26.2
david_king vino 2.27
david_king vino 2.27.5
david_king vino 2.27.90
david_king vino 2.27.91
david_king vino 2.27.92
david_king vino 2.28
david_king vino 2.28.3
david_king vino 2.31.4
david_king vino 2.31.91
david_king vino 2.32.0
david_king vino 2.32.2
david_king vino 2.99.0
david_king vino 2.99.1
david_king vino 2.99.2
david_king vino 2.99.3
david_king vino 2.99.4
david_king vino 2.99.5
david_king vino 3.0.0
david_king vino 3.0.1
david_king vino 3.0.2
david_king vino 3.0.3
david_king vino 3.1
david_king vino 3.1.1
david_king vino 3.1.2
david_king vino 3.1.3
david_king vino 3.1.4
david_king vino 3.1.5
david_king vino 3.1.90
david_king vino 3.1.91
david_king vino 3.1.92
david_king vino 3.2.0
david_king vino 3.2.1
david_king vino 3.2.2
david_king vino 3.3.1
david_king vino 3.3.3
david_king vino 3.3.92
david_king vino 3.4.0
david_king vino 3.4.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9A55EB2-A6CC-47B3-868D-D0D2EFDE2742",
              "versionEndIncluding": "3.4.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "684BA3AA-8858-4C04-89E1-FF379FBF9BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68804C21-E455-4107-817F-34E877CC63E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8EEC2E-2051-4B1B-856D-F0AF0CB63993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F58B0BB-0662-4CB5-8C40-EFB08FBD02EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8FD528-3E50-4956-88ED-73F26F2978BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0387A219-D5EB-489B-BCF5-BFDD771EA15F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4E4BFAD-B66B-478A-940C-CBABD7C0EF26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F33E80-8A2A-4391-9683-C12553FB6FE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAABD80A-61A4-4858-8DB3-F7B677879E02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900."
    },
    {
      "lang": "es",
      "value": "Vino 2.28, 2.32, 3.4.2 y anteriores permite a atacantes remotos leer actividad de portapapeles escuchando en el puerto TCP 5900."
    }
  ],
  "id": "CVE-2012-4429",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-10-01T00:55:01.540",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/50527"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/55548"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1701-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/50527"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1701-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0904

Vulnerability from fkie_nvd - Published: 2011-05-10 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
References
cve@mitre.orghttp://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
cve@mitre.orghttp://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
cve@mitre.orghttp://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522fPatch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8aPatch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975dPatch
cve@mitre.orghttp://git.gnome.org/browse/vino/log/?h=gnome-2-30Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/tree/NEWS
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0169.html
cve@mitre.orghttp://secunia.com/advisories/44410Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/44463Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2238
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:087
cve@mitre.orghttp://www.securityfocus.com/bid/47681
cve@mitre.orghttp://www.ubuntu.com/usn/usn-1128-1/
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/1144Vendor Advisory
cve@mitre.orghttps://bugzilla.gnome.org/show_bug.cgi?id=641802Patch
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=694455Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/67243
af854a3a-2127-422b-91ae-364da2661108http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
af854a3a-2127-422b-91ae-364da2661108http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
af854a3a-2127-422b-91ae-364da2661108http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522fPatch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8aPatch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975dPatch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/log/?h=gnome-2-30Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/tree/NEWS
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0169.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44410Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44463Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2238
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:087
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47681
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-1128-1/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/1144Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.gnome.org/show_bug.cgi?id=641802Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=694455Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/67243
Impacted products
Vendor Product Version
david_king vino 2.7
david_king vino 2.7.3
david_king vino 2.7.3.1
david_king vino 2.7.4
david_king vino 2.7.4.90
david_king vino 2.7.4.91
david_king vino 2.7.92
david_king vino 2.8
david_king vino 2.9
david_king vino 2.9.2
david_king vino 2.10
david_king vino 2.11
david_king vino 2.12
david_king vino 2.13
david_king vino 2.13.5
david_king vino 2.14
david_king vino 2.15
david_king vino 2.16
david_king vino 2.17
david_king vino 2.17.2
david_king vino 2.17.4
david_king vino 2.17.5
david_king vino 2.17.92
david_king vino 2.18
david_king vino 2.18.1
david_king vino 2.19
david_king vino 2.19.5
david_king vino 2.19.90
david_king vino 2.19.92
david_king vino 2.20
david_king vino 2.20.1
david_king vino 2.21
david_king vino 2.21.1
david_king vino 2.21.2
david_king vino 2.21.3
david_king vino 2.21.90
david_king vino 2.21.91
david_king vino 2.21.92
david_king vino 2.22
david_king vino 2.22.1
david_king vino 2.22.2
david_king vino 2.23
david_king vino 2.23.5
david_king vino 2.23.90
david_king vino 2.23.91
david_king vino 2.23.92
david_king vino 2.24
david_king vino 2.24.1
david_king vino 2.25
david_king vino 2.25.3
david_king vino 2.25.4
david_king vino 2.25.5
david_king vino 2.25.90
david_king vino 2.25.91
david_king vino 2.25.92
david_king vino 2.26
david_king vino 2.26.1
david_king vino 2.26.2
david_king vino 2.27
david_king vino 2.27.5
david_king vino 2.27.90
david_king vino 2.27.91
david_king vino 2.27.92
david_king vino 2.28
david_king vino 2.28.1
david_king vino 2.28.2
david_king vino 2.32.0
david_king vino 2.32.1
david_king vino 3.0.0
david_king vino 3.0.1
david_king vino 3.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n rfbSendFramebufferUpdate en server/libvncserver/rfbserver.c en vino-server en Vino v2.x antes de v2.28.3, v2.32.x antes de v2.32.2, v3.0.x antes de v3.0.2, y v3.1.x antes de v3.1.1, cuando se utiliza la codificaci\u00f3n \"raw\", permite a usuarios autenticados remotamente causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de un gran tama\u00f1o en el valor de (1) la posici\u00f3n X o (2) la posici\u00f3n Y en una solicitud de actualizaci\u00f3n de uso de este dispositivo que provoca un acceso a memoria fuera de l\u00edmites, relacionado con las funciones rfbTranslateNone y rfbSendRectEncodingRaw."
    }
  ],
  "id": "CVE-2011-0904",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-10T18:55:01.263",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://git.gnome.org/browse/vino/tree/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44410"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2238"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/47681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-1128-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1144"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.gnome.org/browse/vino/tree/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44410"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-1128-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0905

Vulnerability from fkie_nvd - Published: 2011-05-10 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
References
cve@mitre.orghttp://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
cve@mitre.orghttp://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
cve@mitre.orghttp://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522fPatch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8aPatch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975dPatch
cve@mitre.orghttp://git.gnome.org/browse/vino/log/?h=gnome-2-30Patch
cve@mitre.orghttp://git.gnome.org/browse/vino/tree/NEWS
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0169.html
cve@mitre.orghttp://secunia.com/advisories/44410Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/44463Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2238
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:087
cve@mitre.orghttp://www.securityfocus.com/bid/47681
cve@mitre.orghttp://www.ubuntu.com/usn/usn-1128-1/
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/1144Vendor Advisory
cve@mitre.orghttps://bugzilla.gnome.org/show_bug.cgi?id=641803
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=694456Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/67244
af854a3a-2127-422b-91ae-364da2661108http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
af854a3a-2127-422b-91ae-364da2661108http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
af854a3a-2127-422b-91ae-364da2661108http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522fPatch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8aPatch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975dPatch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/log/?h=gnome-2-30Patch
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/vino/tree/NEWS
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0169.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44410Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44463Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2238
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:087
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47681
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-1128-1/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/1144Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.gnome.org/show_bug.cgi?id=641803
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=694456Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/67244

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n rfbSendFramebufferUpdate en server/libvncserver/rfbserver.c en vino-server en Vino v2.x antes de v2.28.3, 2.32.x antes de v2.32.2, v3.0.x antes de v3.0.2, y v3.1.x antes de v3.1.1, cuando se utiliza la codificaci\u00f3n \"tight\", permite a usuarios autenticados remotamente causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de las dimensiones manipuladas en una solicitud de actualizaci\u00f3n de uso de este dispositivo, que provoca una operaci\u00f3n de lectura fuera de l\u00edmites."
    }
  ],
  "id": "CVE-2011-0905",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-10T18:55:01.310",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://git.gnome.org/browse/vino/tree/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44410"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2238"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/47681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-1128-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1144"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.gnome.org/browse/vino/tree/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44410"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-1128-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-5745 (GCVE-0-2013-5745)

Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-08-06 17:22
VLAI?
Summary
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:22:30.780Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
          },
          {
            "name": "RHSA-2013:1452",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
          },
          {
            "name": "55090",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55090"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
          },
          {
            "name": "USN-1980-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1980-1"
          },
          {
            "name": "SUSE-SU-2013:1631",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-01T17:26:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
        },
        {
          "name": "RHSA-2013:1452",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
        },
        {
          "name": "55090",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55090"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
        },
        {
          "name": "USN-1980-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1980-1"
        },
        {
          "name": "SUSE-SU-2013:1631",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-5745",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
            },
            {
              "name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
              "refsource": "MISC",
              "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
            },
            {
              "name": "RHSA-2013:1452",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
            },
            {
              "name": "55090",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55090"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
            },
            {
              "name": "USN-1980-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1980-1"
            },
            {
              "name": "SUSE-SU-2013:1631",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-5745",
    "datePublished": "2013-10-01T17:00:00",
    "dateReserved": "2013-09-16T00:00:00",
    "dateUpdated": "2024-08-06T17:22:30.780Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1164 (GCVE-0-2011-1164)

Vulnerability from cvelistv5 – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:28.070Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-12T22:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1164",
    "datePublished": "2013-03-12T22:00:00Z",
    "dateReserved": "2011-03-03T00:00:00Z",
    "dateUpdated": "2024-08-06T22:14:28.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1165 (GCVE-0-2011-1165)

Vulnerability from cvelistv5 – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:28.039Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-12T22:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1165",
    "datePublished": "2013-03-12T22:00:00Z",
    "dateReserved": "2011-03-03T00:00:00Z",
    "dateUpdated": "2024-08-06T22:14:28.039Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4429 (GCVE-0-2012-4429)

Vulnerability from cvelistv5 – Published: 2012-10-01 00:00 – Updated: 2024-08-06 20:35
VLAI?
Summary
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://rhn.redhat.com/errata/RHSA-2013-0169.html vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2012/09/14/1 mailing-listx_refsource_MLIST
http://www.ubuntu.com/usn/USN-1701-1 vendor-advisoryx_refsource_UBUNTU
http://www.securityfocus.com/bid/55548 vdb-entryx_refsource_BID
http://www.openwall.com/lists/oss-security/2012/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/50527 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:35:09.525Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "name": "vino-clipboard-info-disclosure(78602)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
          },
          {
            "name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
          },
          {
            "name": "USN-1701-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1701-1"
          },
          {
            "name": "55548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55548"
          },
          {
            "name": "[oss-security] 20120913 CVE request: information leak in vino",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
          },
          {
            "name": "50527",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50527"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "name": "vino-clipboard-info-disclosure(78602)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
        },
        {
          "name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
        },
        {
          "name": "USN-1701-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1701-1"
        },
        {
          "name": "55548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55548"
        },
        {
          "name": "[oss-security] 20120913 CVE request: information leak in vino",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
        },
        {
          "name": "50527",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50527"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-4429",
    "datePublished": "2012-10-01T00:00:00",
    "dateReserved": "2012-08-21T00:00:00",
    "dateUpdated": "2024-08-06T20:35:09.525Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0905 (GCVE-0-2011-0905)

Vulnerability from cvelistv5 – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://git.gnome.org/browse/vino/commit/?id=0c2c9… x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-1128-1/ vendor-advisoryx_refsource_UBUNTU
http://git.gnome.org/browse/vino/commit/?id=d050a… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2013-0169.html vendor-advisoryx_refsource_REDHAT
https://bugzilla.gnome.org/show_bug.cgi?id=641803 x_refsource_CONFIRM
http://secunia.com/advisories/44410 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/1144 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/… x_refsource_CONFIRM
http://www.securityfocus.com/bid/47681 vdb-entryx_refsource_BID
http://git.gnome.org/browse/vino/commit/?id=456da… x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=694456 x_refsource_CONFIRM
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2238 vendor-advisoryx_refsource_DEBIAN
http://git.gnome.org/browse/vino/commit/?id=e17bd… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=dff52… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=8beef… x_refsource_CONFIRM
http://secunia.com/advisories/44463 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/v… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/tree/NEWS x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:05:54.452Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
          },
          {
            "name": "USN-1128-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-1128-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
          },
          {
            "name": "SUSE-SR:2011:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
          },
          {
            "name": "MDVSA-2011:087",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
          },
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
          },
          {
            "name": "44410",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44410"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
          },
          {
            "name": "ADV-2011-1144",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1144"
          },
          {
            "name": "vino-framebuffer-dos(67244)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
          },
          {
            "name": "47681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
          },
          {
            "name": "DSA-2238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2238"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
          },
          {
            "name": "44463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44463"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/tree/NEWS"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
        },
        {
          "name": "USN-1128-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-1128-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
        },
        {
          "name": "SUSE-SR:2011:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
        },
        {
          "name": "MDVSA-2011:087",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
        },
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
        },
        {
          "name": "44410",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44410"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
        },
        {
          "name": "ADV-2011-1144",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1144"
        },
        {
          "name": "vino-framebuffer-dos(67244)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
        },
        {
          "name": "47681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
        },
        {
          "name": "DSA-2238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2238"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
        },
        {
          "name": "44463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44463"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/tree/NEWS"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0905",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
            },
            {
              "name": "USN-1128-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-1128-1/"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
            },
            {
              "name": "SUSE-SR:2011:009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
            },
            {
              "name": "MDVSA-2011:087",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
            },
            {
              "name": "RHSA-2013:0169",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=641803",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
            },
            {
              "name": "44410",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44410"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
            },
            {
              "name": "ADV-2011-1144",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/1144"
            },
            {
              "name": "vino-framebuffer-dos(67244)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
            },
            {
              "name": "47681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47681"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=694456",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
            },
            {
              "name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
            },
            {
              "name": "DSA-2238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2238"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
            },
            {
              "name": "44463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44463"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
            },
            {
              "name": "http://git.gnome.org/browse/vino/tree/NEWS",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/tree/NEWS"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0905",
    "datePublished": "2011-05-10T18:00:00",
    "dateReserved": "2011-02-08T00:00:00",
    "dateUpdated": "2024-08-06T22:05:54.452Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0904 (GCVE-0-2011-0904)

Vulnerability from cvelistv5 – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://git.gnome.org/browse/vino/commit/?id=0c2c9… x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-1128-1/ vendor-advisoryx_refsource_UBUNTU
http://git.gnome.org/browse/vino/commit/?id=d050a… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2013-0169.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/44410 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/1144 vdb-entryx_refsource_VUPEN
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/… x_refsource_CONFIRM
http://www.securityfocus.com/bid/47681 vdb-entryx_refsource_BID
http://git.gnome.org/browse/vino/commit/?id=456da… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2238 vendor-advisoryx_refsource_DEBIAN
http://git.gnome.org/browse/vino/commit/?id=e17bd… x_refsource_CONFIRM
https://bugzilla.gnome.org/show_bug.cgi?id=641802 x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=dff52… x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=694455 x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=8beef… x_refsource_CONFIRM
http://secunia.com/advisories/44463 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/v… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/tree/NEWS x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:05:54.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "vino-input-dos(67243)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
          },
          {
            "name": "USN-1128-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-1128-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
          },
          {
            "name": "SUSE-SR:2011:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
          },
          {
            "name": "MDVSA-2011:087",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
          },
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "name": "44410",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44410"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
          },
          {
            "name": "ADV-2011-1144",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
          },
          {
            "name": "47681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
          },
          {
            "name": "DSA-2238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2238"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
          },
          {
            "name": "44463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44463"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/tree/NEWS"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "vino-input-dos(67243)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
        },
        {
          "name": "USN-1128-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-1128-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
        },
        {
          "name": "SUSE-SR:2011:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
        },
        {
          "name": "MDVSA-2011:087",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
        },
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "name": "44410",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44410"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
        },
        {
          "name": "ADV-2011-1144",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
        },
        {
          "name": "47681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
        },
        {
          "name": "DSA-2238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2238"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
        },
        {
          "name": "44463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44463"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/tree/NEWS"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0904",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "vino-input-dos(67243)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
            },
            {
              "name": "USN-1128-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-1128-1/"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
            },
            {
              "name": "SUSE-SR:2011:009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
            },
            {
              "name": "MDVSA-2011:087",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
            },
            {
              "name": "RHSA-2013:0169",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
            },
            {
              "name": "44410",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44410"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
            },
            {
              "name": "ADV-2011-1144",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/1144"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
            },
            {
              "name": "47681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47681"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
            },
            {
              "name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
            },
            {
              "name": "DSA-2238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2238"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=641802",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=694455",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
            },
            {
              "name": "44463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44463"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
            },
            {
              "name": "http://git.gnome.org/browse/vino/tree/NEWS",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/tree/NEWS"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0904",
    "datePublished": "2011-05-10T18:00:00",
    "dateReserved": "2011-02-08T00:00:00",
    "dateUpdated": "2024-08-06T22:05:54.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-5745 (GCVE-0-2013-5745)

Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-08-06 17:22
VLAI?
Summary
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:22:30.780Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
          },
          {
            "name": "RHSA-2013:1452",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
          },
          {
            "name": "55090",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55090"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
          },
          {
            "name": "USN-1980-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1980-1"
          },
          {
            "name": "SUSE-SU-2013:1631",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-01T17:26:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
        },
        {
          "name": "RHSA-2013:1452",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
        },
        {
          "name": "55090",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55090"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
        },
        {
          "name": "USN-1980-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1980-1"
        },
        {
          "name": "SUSE-SU-2013:1631",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-5745",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
            },
            {
              "name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
              "refsource": "MISC",
              "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
            },
            {
              "name": "RHSA-2013:1452",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
            },
            {
              "name": "55090",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55090"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
            },
            {
              "name": "USN-1980-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1980-1"
            },
            {
              "name": "SUSE-SU-2013:1631",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-5745",
    "datePublished": "2013-10-01T17:00:00",
    "dateReserved": "2013-09-16T00:00:00",
    "dateUpdated": "2024-08-06T17:22:30.780Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1164 (GCVE-0-2011-1164)

Vulnerability from nvd – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:28.070Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-12T22:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1164",
    "datePublished": "2013-03-12T22:00:00Z",
    "dateReserved": "2011-03-03T00:00:00Z",
    "dateUpdated": "2024-08-06T22:14:28.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1165 (GCVE-0-2011-1165)

Vulnerability from nvd – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:28.039Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-12T22:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1165",
    "datePublished": "2013-03-12T22:00:00Z",
    "dateReserved": "2011-03-03T00:00:00Z",
    "dateUpdated": "2024-08-06T22:14:28.039Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-4429 (GCVE-0-2012-4429)

Vulnerability from nvd – Published: 2012-10-01 00:00 – Updated: 2024-08-06 20:35
VLAI?
Summary
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://rhn.redhat.com/errata/RHSA-2013-0169.html vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2012/09/14/1 mailing-listx_refsource_MLIST
http://www.ubuntu.com/usn/USN-1701-1 vendor-advisoryx_refsource_UBUNTU
http://www.securityfocus.com/bid/55548 vdb-entryx_refsource_BID
http://www.openwall.com/lists/oss-security/2012/0… mailing-listx_refsource_MLIST
http://secunia.com/advisories/50527 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:35:09.525Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "name": "vino-clipboard-info-disclosure(78602)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
          },
          {
            "name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
          },
          {
            "name": "USN-1701-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1701-1"
          },
          {
            "name": "55548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55548"
          },
          {
            "name": "[oss-security] 20120913 CVE request: information leak in vino",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
          },
          {
            "name": "50527",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50527"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "name": "vino-clipboard-info-disclosure(78602)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
        },
        {
          "name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
        },
        {
          "name": "USN-1701-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1701-1"
        },
        {
          "name": "55548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55548"
        },
        {
          "name": "[oss-security] 20120913 CVE request: information leak in vino",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
        },
        {
          "name": "50527",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50527"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-4429",
    "datePublished": "2012-10-01T00:00:00",
    "dateReserved": "2012-08-21T00:00:00",
    "dateUpdated": "2024-08-06T20:35:09.525Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0905 (GCVE-0-2011-0905)

Vulnerability from nvd – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://git.gnome.org/browse/vino/commit/?id=0c2c9… x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-1128-1/ vendor-advisoryx_refsource_UBUNTU
http://git.gnome.org/browse/vino/commit/?id=d050a… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2013-0169.html vendor-advisoryx_refsource_REDHAT
https://bugzilla.gnome.org/show_bug.cgi?id=641803 x_refsource_CONFIRM
http://secunia.com/advisories/44410 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/1144 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/… x_refsource_CONFIRM
http://www.securityfocus.com/bid/47681 vdb-entryx_refsource_BID
http://git.gnome.org/browse/vino/commit/?id=456da… x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=694456 x_refsource_CONFIRM
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2238 vendor-advisoryx_refsource_DEBIAN
http://git.gnome.org/browse/vino/commit/?id=e17bd… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=dff52… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=8beef… x_refsource_CONFIRM
http://secunia.com/advisories/44463 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/v… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/tree/NEWS x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:05:54.452Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
          },
          {
            "name": "USN-1128-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-1128-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
          },
          {
            "name": "SUSE-SR:2011:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
          },
          {
            "name": "MDVSA-2011:087",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
          },
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
          },
          {
            "name": "44410",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44410"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
          },
          {
            "name": "ADV-2011-1144",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1144"
          },
          {
            "name": "vino-framebuffer-dos(67244)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
          },
          {
            "name": "47681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
          },
          {
            "name": "DSA-2238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2238"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
          },
          {
            "name": "44463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44463"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/tree/NEWS"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
        },
        {
          "name": "USN-1128-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-1128-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
        },
        {
          "name": "SUSE-SR:2011:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
        },
        {
          "name": "MDVSA-2011:087",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
        },
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
        },
        {
          "name": "44410",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44410"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
        },
        {
          "name": "ADV-2011-1144",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1144"
        },
        {
          "name": "vino-framebuffer-dos(67244)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
        },
        {
          "name": "47681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
        },
        {
          "name": "DSA-2238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2238"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
        },
        {
          "name": "44463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44463"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/tree/NEWS"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0905",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
            },
            {
              "name": "USN-1128-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-1128-1/"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
            },
            {
              "name": "SUSE-SR:2011:009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
            },
            {
              "name": "MDVSA-2011:087",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
            },
            {
              "name": "RHSA-2013:0169",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=641803",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
            },
            {
              "name": "44410",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44410"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
            },
            {
              "name": "ADV-2011-1144",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/1144"
            },
            {
              "name": "vino-framebuffer-dos(67244)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
            },
            {
              "name": "47681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47681"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=694456",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
            },
            {
              "name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
            },
            {
              "name": "DSA-2238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2238"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
            },
            {
              "name": "44463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44463"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
            },
            {
              "name": "http://git.gnome.org/browse/vino/tree/NEWS",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/tree/NEWS"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0905",
    "datePublished": "2011-05-10T18:00:00",
    "dateReserved": "2011-02-08T00:00:00",
    "dateUpdated": "2024-08-06T22:05:54.452Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0904 (GCVE-0-2011-0904)

Vulnerability from nvd – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://git.gnome.org/browse/vino/commit/?id=0c2c9… x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-1128-1/ vendor-advisoryx_refsource_UBUNTU
http://git.gnome.org/browse/vino/commit/?id=d050a… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2013-0169.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/44410 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/1144 vdb-entryx_refsource_VUPEN
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/… x_refsource_CONFIRM
http://www.securityfocus.com/bid/47681 vdb-entryx_refsource_BID
http://git.gnome.org/browse/vino/commit/?id=456da… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 x_refsource_CONFIRM
http://www.debian.org/security/2011/dsa-2238 vendor-advisoryx_refsource_DEBIAN
http://git.gnome.org/browse/vino/commit/?id=e17bd… x_refsource_CONFIRM
https://bugzilla.gnome.org/show_bug.cgi?id=641802 x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=dff52… x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=694455 x_refsource_CONFIRM
http://git.gnome.org/browse/vino/commit/?id=8beef… x_refsource_CONFIRM
http://secunia.com/advisories/44463 third-party-advisoryx_refsource_SECUNIA
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/v… x_refsource_CONFIRM
http://git.gnome.org/browse/vino/tree/NEWS x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:05:54.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "vino-input-dos(67243)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
          },
          {
            "name": "USN-1128-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-1128-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
          },
          {
            "name": "SUSE-SR:2011:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
          },
          {
            "name": "MDVSA-2011:087",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
          },
          {
            "name": "RHSA-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
          },
          {
            "name": "44410",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44410"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
          },
          {
            "name": "ADV-2011-1144",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
          },
          {
            "name": "47681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
          },
          {
            "name": "DSA-2238",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2238"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
          },
          {
            "name": "44463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44463"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/vino/tree/NEWS"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "vino-input-dos(67243)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
        },
        {
          "name": "USN-1128-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-1128-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
        },
        {
          "name": "SUSE-SR:2011:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
        },
        {
          "name": "MDVSA-2011:087",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
        },
        {
          "name": "RHSA-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
        },
        {
          "name": "44410",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44410"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
        },
        {
          "name": "ADV-2011-1144",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
        },
        {
          "name": "47681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
        },
        {
          "name": "DSA-2238",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2238"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
        },
        {
          "name": "44463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44463"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/vino/tree/NEWS"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0904",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "vino-input-dos(67243)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
            },
            {
              "name": "USN-1128-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-1128-1/"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
            },
            {
              "name": "SUSE-SR:2011:009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
            },
            {
              "name": "MDVSA-2011:087",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
            },
            {
              "name": "RHSA-2013:0169",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
            },
            {
              "name": "44410",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44410"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
            },
            {
              "name": "ADV-2011-1144",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/1144"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
            },
            {
              "name": "47681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47681"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
            },
            {
              "name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
            },
            {
              "name": "DSA-2238",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2238"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
            },
            {
              "name": "https://bugzilla.gnome.org/show_bug.cgi?id=641802",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=694455",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
            },
            {
              "name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
            },
            {
              "name": "44463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44463"
            },
            {
              "name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
              "refsource": "CONFIRM",
              "url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
            },
            {
              "name": "http://git.gnome.org/browse/vino/tree/NEWS",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/vino/tree/NEWS"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0904",
    "datePublished": "2011-05-10T18:00:00",
    "dateReserved": "2011-02-08T00:00:00",
    "dateUpdated": "2024-08-06T22:05:54.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}