Search criteria
18 vulnerabilities found for vino by david_king
FKIE_CVE-2013-5745
Vulnerability from fkie_nvd - Published: 2013-10-01 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD2A524-DE56-4CF6-9C2D-B4507380696B",
"versionEndIncluding": "3.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
"matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "684BA3AA-8858-4C04-89E1-FF379FBF9BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "68804C21-E455-4107-817F-34E877CC63E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8EEC2E-2051-4B1B-856D-F0AF0CB63993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F58B0BB-0662-4CB5-8C40-EFB08FBD02EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8FD528-3E50-4956-88ED-73F26F2978BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0387A219-D5EB-489B-BCF5-BFDD771EA15F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E4BFAD-B66B-478A-940C-CBABD7C0EF26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53F33E80-8A2A-4391-9683-C12553FB6FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DAABD80A-61A4-4858-8DB3-F7B677879E02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAE2EFC-75A5-4B4E-BA67-F1E781A56E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A23DA576-C113-410A-BA6E-4ABF5C0DC3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.5.90:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FB40B0-CF82-44BC-BA60-A427EF4E6C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.5.92:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F02E59-1E5D-4ACF-AA21-F4210E019B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB40778-70B6-4FD1-9EBB-F29F33D2009C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F76A5AA-8CAA-453C-B053-0FF739C59BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3358E6AE-AA6D-4B60-8E9D-D23652D792FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
},
{
"lang": "es",
"value": "La funci\u00f3n vino_client_data_pending en vino-server.c de GNOME Vino 2.26.1, 2.32.1, 3.7.3 y anteriores, y 3.8 cuando el cifrado esta deshabilitado, no limpia los datos del cliente apropiadamente cuando un error causa que la conexi\u00f3n se cierre durante una autenticaci\u00f3n, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU y memoria) a trav\u00e9s de m\u00faltiples peticiones manipuladas durante la autenticaci\u00f3n."
}
],
"id": "CVE-2013-5745",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-01T17:55:03.727",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55090"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"source": "cve@mitre.org",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-1165
Vulnerability from fkie_nvd - Published: 2013-03-12 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE94F71C-7189-4411-94DA-30F6564EA85C",
"versionEndIncluding": "3.1.92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
"matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks."
},
{
"lang": "es",
"value": "Vino, posiblemente versiones anterior a 3.2, no documenta adecuadamente que abre puertos en enrutadores UPnP cuando se activa la opci\u00f3n \"Configure network to automatically accept connections\", lo que podr\u00eda facilitar a atacantes remotos llevar a cabo otro tipo de ataques."
}
],
"id": "CVE-2011-1165",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-12T23:55:01.283",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-1164
Vulnerability from fkie_nvd - Published: 2013-03-12 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"matchCriteriaId": "262D3C13-9D57-4B56-A91F-5B0EE7FC4057",
"versionEndIncluding": "2.99.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
"matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks."
},
{
"lang": "es",
"value": "Vino anterior a v2.99.4 se puede conectar a redes externas contrarias a la establecida en el cuadro de preferencias de vino (vino-preferences), lo que podr\u00eda hacer m\u00e1s f\u00e1cil para los atacantes remotos a la hora de realizar ataques."
}
],
"id": "CVE-2011-1164",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-12T23:55:01.230",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-4429
Vulnerability from fkie_nvd - Published: 2012-10-01 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A55EB2-A6CC-47B3-868D-D0D2EFDE2742",
"versionEndIncluding": "3.4.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "684BA3AA-8858-4C04-89E1-FF379FBF9BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "68804C21-E455-4107-817F-34E877CC63E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8EEC2E-2051-4B1B-856D-F0AF0CB63993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F58B0BB-0662-4CB5-8C40-EFB08FBD02EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8FD528-3E50-4956-88ED-73F26F2978BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0387A219-D5EB-489B-BCF5-BFDD771EA15F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E4BFAD-B66B-478A-940C-CBABD7C0EF26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53F33E80-8A2A-4391-9683-C12553FB6FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DAABD80A-61A4-4858-8DB3-F7B677879E02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900."
},
{
"lang": "es",
"value": "Vino 2.28, 2.32, 3.4.2 y anteriores permite a atacantes remotos leer actividad de portapapeles escuchando en el puerto TCP 5900."
}
],
"id": "CVE-2012-4429",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-10-01T00:55:01.540",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/50527"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/55548"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1701-1"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/50527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/55548"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1701-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0904
Vulnerability from fkie_nvd - Published: 2011-05-10 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
"matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
},
{
"lang": "es",
"value": "La funci\u00f3n rfbSendFramebufferUpdate en server/libvncserver/rfbserver.c en vino-server en Vino v2.x antes de v2.28.3, v2.32.x antes de v2.32.2, v3.0.x antes de v3.0.2, y v3.1.x antes de v3.1.1, cuando se utiliza la codificaci\u00f3n \"raw\", permite a usuarios autenticados remotamente causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de un gran tama\u00f1o en el valor de (1) la posici\u00f3n X o (2) la posici\u00f3n Y en una solicitud de actualizaci\u00f3n de uso de este dispositivo que provoca un acceso a memoria fuera de l\u00edmites, relacionado con las funciones rfbTranslateNone y rfbSendRectEncodingRaw."
}
],
"id": "CVE-2011-0904",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-05-10T18:55:01.263",
"references": [
{
"source": "cve@mitre.org",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"source": "cve@mitre.org",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"source": "cve@mitre.org",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"source": "cve@mitre.org",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44410"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44463"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44410"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44463"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0905
Vulnerability from fkie_nvd - Published: 2011-05-10 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
},
{
"lang": "es",
"value": "La funci\u00f3n rfbSendFramebufferUpdate en server/libvncserver/rfbserver.c en vino-server en Vino v2.x antes de v2.28.3, 2.32.x antes de v2.32.2, v3.0.x antes de v3.0.2, y v3.1.x antes de v3.1.1, cuando se utiliza la codificaci\u00f3n \"tight\", permite a usuarios autenticados remotamente causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de las dimensiones manipuladas en una solicitud de actualizaci\u00f3n de uso de este dispositivo, que provoca una operaci\u00f3n de lectura fuera de l\u00edmites."
}
],
"id": "CVE-2011-0905",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-05-10T18:55:01.310",
"references": [
{
"source": "cve@mitre.org",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"source": "cve@mitre.org",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"source": "cve@mitre.org",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"source": "cve@mitre.org",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44410"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44463"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44410"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44463"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2013-5745 (GCVE-0-2013-5745)
Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-08-06 17:22
VLAI?
Summary
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:22:30.780Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55090"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-09-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-12-01T17:26:34",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55090"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5745",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55090"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-5745",
"datePublished": "2013-10-01T17:00:00",
"dateReserved": "2013-09-16T00:00:00",
"dateUpdated": "2024-08-06T17:22:30.780Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1164 (GCVE-0-2011-1164)
Vulnerability from cvelistv5 – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:28.070Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-12T22:00:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1164",
"datePublished": "2013-03-12T22:00:00Z",
"dateReserved": "2011-03-03T00:00:00Z",
"dateUpdated": "2024-08-06T22:14:28.070Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1165 (GCVE-0-2011-1165)
Vulnerability from cvelistv5 – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:28.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-12T22:00:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1165",
"datePublished": "2013-03-12T22:00:00Z",
"dateReserved": "2011-03-03T00:00:00Z",
"dateUpdated": "2024-08-06T22:14:28.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4429 (GCVE-0-2012-4429)
Vulnerability from cvelistv5 – Published: 2012-10-01 00:00 – Updated: 2024-08-06 20:35
VLAI?
Summary
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:35:09.525Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "vino-clipboard-info-disclosure(78602)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
},
{
"name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
},
{
"name": "USN-1701-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1701-1"
},
{
"name": "55548",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/55548"
},
{
"name": "[oss-security] 20120913 CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
},
{
"name": "50527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50527"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-06-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "vino-clipboard-info-disclosure(78602)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
},
{
"name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
},
{
"name": "USN-1701-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1701-1"
},
{
"name": "55548",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/55548"
},
{
"name": "[oss-security] 20120913 CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
},
{
"name": "50527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50527"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-4429",
"datePublished": "2012-10-01T00:00:00",
"dateReserved": "2012-08-21T00:00:00",
"dateUpdated": "2024-08-06T20:35:09.525Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0905 (GCVE-0-2011-0905)
Vulnerability from cvelistv5 – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:05:54.452Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "vino-framebuffer-dos(67244)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "vino-framebuffer-dos(67244)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0905",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641803",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"name": "44410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44410"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "vino-framebuffer-dos(67244)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=694456",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44463"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"name": "http://git.gnome.org/browse/vino/tree/NEWS",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-0905",
"datePublished": "2011-05-10T18:00:00",
"dateReserved": "2011-02-08T00:00:00",
"dateUpdated": "2024-08-06T22:05:54.452Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0904 (GCVE-0-2011-0904)
Vulnerability from cvelistv5 – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:05:54.511Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "vino-input-dos(67243)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "vino-input-dos(67243)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0904",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "vino-input-dos(67243)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "44410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44410"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641802",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=694455",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44463"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"name": "http://git.gnome.org/browse/vino/tree/NEWS",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-0904",
"datePublished": "2011-05-10T18:00:00",
"dateReserved": "2011-02-08T00:00:00",
"dateUpdated": "2024-08-06T22:05:54.511Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-5745 (GCVE-0-2013-5745)
Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-08-06 17:22
VLAI?
Summary
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:22:30.780Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55090"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-09-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-12-01T17:26:34",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55090"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5745",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55090"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-5745",
"datePublished": "2013-10-01T17:00:00",
"dateReserved": "2013-09-16T00:00:00",
"dateUpdated": "2024-08-06T17:22:30.780Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1164 (GCVE-0-2011-1164)
Vulnerability from nvd – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:28.070Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-12T22:00:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=596190"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1164",
"datePublished": "2013-03-12T22:00:00Z",
"dateReserved": "2011-03-03T00:00:00Z",
"dateUpdated": "2024-08-06T22:14:28.070Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1165 (GCVE-0-2011-1165)
Vulnerability from nvd – Published: 2013-03-12 22:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:28.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-12T22:00:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=594521"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=410bbf8e284409bdef02322af4d4a3a388419566"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.dslreports.com/forum/r25446313-Ubuntu-computer-hijacked-by-hacker~start=40"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1165",
"datePublished": "2013-03-12T22:00:00Z",
"dateReserved": "2011-03-03T00:00:00Z",
"dateUpdated": "2024-08-06T22:14:28.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4429 (GCVE-0-2012-4429)
Vulnerability from nvd – Published: 2012-10-01 00:00 – Updated: 2024-08-06 20:35
VLAI?
Summary
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:35:09.525Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "vino-clipboard-info-disclosure(78602)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
},
{
"name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
},
{
"name": "USN-1701-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1701-1"
},
{
"name": "55548",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/55548"
},
{
"name": "[oss-security] 20120913 CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
},
{
"name": "50527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/50527"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-06-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "vino-clipboard-info-disclosure(78602)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78602"
},
{
"name": "[oss-security] 20120913 Re: CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/14/1"
},
{
"name": "USN-1701-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1701-1"
},
{
"name": "55548",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/55548"
},
{
"name": "[oss-security] 20120913 CVE request: information leak in vino",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/25"
},
{
"name": "50527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/50527"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-4429",
"datePublished": "2012-10-01T00:00:00",
"dateReserved": "2012-08-21T00:00:00",
"dateUpdated": "2024-08-06T20:35:09.525Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0905 (GCVE-0-2011-0905)
Vulnerability from nvd – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:05:54.452Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "vino-framebuffer-dos(67244)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "vino-framebuffer-dos(67244)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0905",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641803",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641803"
},
{
"name": "44410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44410"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "vino-framebuffer-dos(67244)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67244"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=694456",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
},
{
"name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44463"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"name": "http://git.gnome.org/browse/vino/tree/NEWS",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-0905",
"datePublished": "2011-05-10T18:00:00",
"dateReserved": "2011-02-08T00:00:00",
"dateUpdated": "2024-08-06T22:05:54.452Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0904 (GCVE-0-2011-0904)
Vulnerability from nvd – Published: 2011-05-10 18:00 – Updated: 2024-08-06 22:05
VLAI?
Summary
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:05:54.511Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "vino-input-dos(67243)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "vino-input-dos(67243)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "44410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44410"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47681"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44463"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0904",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "vino-input-dos(67243)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67243"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0"
},
{
"name": "USN-1128-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-1128-1/"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a"
},
{
"name": "SUSE-SR:2011:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"
},
{
"name": "MDVSA-2011:087",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:087"
},
{
"name": "RHSA-2013:0169",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0169.html"
},
{
"name": "44410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44410"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news"
},
{
"name": "ADV-2011-1144",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1144"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news"
},
{
"name": "47681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47681"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f"
},
{
"name": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/log/?h=gnome-2-30"
},
{
"name": "DSA-2238",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2238"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641802",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641802"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=694455",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
},
{
"name": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279"
},
{
"name": "44463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44463"
},
{
"name": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news",
"refsource": "CONFIRM",
"url": "http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news"
},
{
"name": "http://git.gnome.org/browse/vino/tree/NEWS",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/vino/tree/NEWS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-0904",
"datePublished": "2011-05-10T18:00:00",
"dateReserved": "2011-02-08T00:00:00",
"dateUpdated": "2024-08-06T22:05:54.511Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}