RHSA-2013:0169

Vulnerability from csaf_redhat - Published: 2013-01-21 22:31 - Updated: 2025-11-21 17:41
Summary
Red Hat Security Advisory: vino security update

Notes

Topic
An updated vino package that fixes several security issues is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
Vino is a Virtual Network Computing (VNC) server for GNOME. It allows remote users to connect to a running GNOME session using VNC. It was found that Vino transmitted all clipboard activity on the system running Vino to all clients connected to port 5900, even those who had not authenticated. A remote attacker who is able to access port 5900 on a system running Vino could use this flaw to read clipboard data without authenticating. (CVE-2012-4429) Two out-of-bounds memory read flaws were found in the way Vino processed client framebuffer requests in certain encodings. An authenticated client could use these flaws to send a specially-crafted request to Vino, causing it to crash. (CVE-2011-0904, CVE-2011-0905) In certain circumstances, the vino-preferences dialog box incorrectly indicated that Vino was only accessible from the local network. This could confuse a user into believing connections from external networks are not allowed (even when they are allowed). With this update, vino-preferences no longer displays connectivity and reachable information. (CVE-2011-1164) There was no warning that Universal Plug and Play (UPnP) was used to open ports on a user's network router when the "Configure network automatically to accept connections" option was enabled (it is disabled by default) in the Vino preferences. This update changes the option's description to avoid the risk of a UPnP router configuration change without the user's consent. (CVE-2011-1165) All Vino users should upgrade to this updated package, which contains backported patches to resolve these issues. The GNOME session must be restarted (log out, then log back in) for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated vino package that fixes several security issues is now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Vino is a Virtual Network Computing (VNC) server for GNOME. It allows\nremote users to connect to a running GNOME session using VNC.\n\nIt was found that Vino transmitted all clipboard activity on the system\nrunning Vino to all clients connected to port 5900, even those who had not\nauthenticated. A remote attacker who is able to access port 5900 on a\nsystem running Vino could use this flaw to read clipboard data without\nauthenticating. (CVE-2012-4429)\n\nTwo out-of-bounds memory read flaws were found in the way Vino processed\nclient framebuffer requests in certain encodings. An authenticated client\ncould use these flaws to send a specially-crafted request to Vino, causing\nit to crash. (CVE-2011-0904, CVE-2011-0905)\n\nIn certain circumstances, the vino-preferences dialog box incorrectly\nindicated that Vino was only accessible from the local network. This could\nconfuse a user into believing connections from external networks are not\nallowed (even when they are allowed). With this update, vino-preferences no\nlonger displays connectivity and reachable information. (CVE-2011-1164)\n\nThere was no warning that Universal Plug and Play (UPnP) was used to open\nports on a user\u0027s network router when the \"Configure network automatically\nto accept connections\" option was enabled (it is disabled by default) in\nthe Vino preferences. This update changes the option\u0027s description to avoid\nthe risk of a UPnP router configuration change without the user\u0027s consent.\n(CVE-2011-1165)\n\nAll Vino users should upgrade to this updated package, which contains\nbackported patches to resolve these issues. The GNOME session must be\nrestarted (log out, then log back in) for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2013:0169",
        "url": "https://access.redhat.com/errata/RHSA-2013:0169"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "553477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
      },
      {
        "category": "external",
        "summary": "678846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
      },
      {
        "category": "external",
        "summary": "694455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
      },
      {
        "category": "external",
        "summary": "694456",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
      },
      {
        "category": "external",
        "summary": "857250",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857250"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0169.json"
      }
    ],
    "title": "Red Hat Security Advisory: vino security update",
    "tracking": {
      "current_release_date": "2025-11-21T17:41:54+00:00",
      "generator": {
        "date": "2025-11-21T17:41:54+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.12"
        }
      },
      "id": "RHSA-2013:0169",
      "initial_release_date": "2013-01-21T22:31:00+00:00",
      "revision_history": [
        {
          "date": "2013-01-21T22:31:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2013-01-21T22:34:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-11-21T17:41:54+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.3.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.3.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.3.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
                "product": {
                  "name": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
                  "product_id": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino-debuginfo@2.28.1-8.el6_3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vino-0:2.28.1-8.el6_3.x86_64",
                "product": {
                  "name": "vino-0:2.28.1-8.el6_3.x86_64",
                  "product_id": "vino-0:2.28.1-8.el6_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino@2.28.1-8.el6_3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vino-debuginfo-0:2.28.1-8.el6_3.i686",
                "product": {
                  "name": "vino-debuginfo-0:2.28.1-8.el6_3.i686",
                  "product_id": "vino-debuginfo-0:2.28.1-8.el6_3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino-debuginfo@2.28.1-8.el6_3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vino-0:2.28.1-8.el6_3.i686",
                "product": {
                  "name": "vino-0:2.28.1-8.el6_3.i686",
                  "product_id": "vino-0:2.28.1-8.el6_3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino@2.28.1-8.el6_3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vino-0:2.28.1-8.el6_3.src",
                "product": {
                  "name": "vino-0:2.28.1-8.el6_3.src",
                  "product_id": "vino-0:2.28.1-8.el6_3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino@2.28.1-8.el6_3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vino-debuginfo-0:2.28.1-8.el6_3.s390x",
                "product": {
                  "name": "vino-debuginfo-0:2.28.1-8.el6_3.s390x",
                  "product_id": "vino-debuginfo-0:2.28.1-8.el6_3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino-debuginfo@2.28.1-8.el6_3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vino-0:2.28.1-8.el6_3.s390x",
                "product": {
                  "name": "vino-0:2.28.1-8.el6_3.s390x",
                  "product_id": "vino-0:2.28.1-8.el6_3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino@2.28.1-8.el6_3?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
                "product": {
                  "name": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
                  "product_id": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino-debuginfo@2.28.1-8.el6_3?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vino-0:2.28.1-8.el6_3.ppc64",
                "product": {
                  "name": "vino-0:2.28.1-8.el6_3.ppc64",
                  "product_id": "vino-0:2.28.1-8.el6_3.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/vino@2.28.1-8.el6_3?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.i686",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.ppc64",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.s390x",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.src",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.x86_64",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.i686",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.s390x",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
        "relates_to_product_reference": "6Client-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.i686",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.ppc64",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.s390x",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.src",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.x86_64",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.i686",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.s390x",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
        "relates_to_product_reference": "6Server-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.i686",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.ppc64",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.s390x",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.src",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-0:2.28.1-8.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64"
        },
        "product_reference": "vino-0:2.28.1-8.el6_3.x86_64",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.i686",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.s390x",
        "relates_to_product_reference": "6Workstation-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        },
        "product_reference": "vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
        "relates_to_product_reference": "6Workstation-6.3.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-0904",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2011-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "694455"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "vino: Out of bounds read flaw by processing certain client raw encoding framebuffer update requests",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0904"
        },
        {
          "category": "external",
          "summary": "RHBZ#694455",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694455"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0904",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0904"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0904",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0904"
        }
      ],
      "release_date": "2011-05-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2013-01-21T22:31:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2013:0169"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "vino: Out of bounds read flaw by processing certain client raw encoding framebuffer update requests"
    },
    {
      "cve": "CVE-2011-0905",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2011-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "694456"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "vino: Out of bounds read flaw by processing certain client tight encoding framebuffer update requests",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0905"
        },
        {
          "category": "external",
          "summary": "RHBZ#694456",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694456"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0905",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0905"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0905",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0905"
        }
      ],
      "release_date": "2011-05-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2013-01-21T22:31:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2013:0169"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "vino: Out of bounds read flaw by processing certain client tight encoding framebuffer update requests"
    },
    {
      "cve": "CVE-2011-1164",
      "discovery_date": "2010-01-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "553477"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "vino: vino-preferences incorrectly indicates that computer is only reachable over local network",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of vino as shipped with Red Hat Enterprise Linux 4 or 5 as they did not include support for Universal Plug and Play (UPnP).  A future update in Red Hat Enterprise Linux 6 may address this flaw.  To mitigate this issue, users should ensure that confirmation is requested on each inbound connection attempt, that a password is required to connect, and that automatic network configuration is disabled.  This will prevent vino from using UPnP to allow access to the VNC port, and will ensure that any connections require a password and that the user is notified on any connection attempts.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1164"
        },
        {
          "category": "external",
          "summary": "RHBZ#553477",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553477"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1164",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1164"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1164",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1164"
        }
      ],
      "release_date": "2009-03-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2013-01-21T22:31:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2013:0169"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "vino: vino-preferences incorrectly indicates that computer is only reachable over local network"
    },
    {
      "cve": "CVE-2011-1165",
      "discovery_date": "2011-02-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "678846"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the \"Configure network to automatically accept connections\" setting is enabled, which might make it easier for remote attackers to perform further attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "vino-preferences does not warn about UPnP especially with no password and no confirmation.",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of vino as shipped with Red Hat Enterprise Linux 4 or 5 as they did not include support for Universal Plug and Play (UPnP).  A future update in Red Hat Enterprise Linux 6 may address this flaw.  To mitigate this issue, users should ensure that confirmation is requested on each inbound connection attempt, that a password is required to connect, and that automatic network configuration is disabled.  This will prevent vino from using UPnP to allow access to the VNC port, and will ensure that any connections require a password and that the user is notified on any connection attempts.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1165"
        },
        {
          "category": "external",
          "summary": "RHBZ#678846",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678846"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1165",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1165"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1165",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1165"
        }
      ],
      "release_date": "2009-09-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2013-01-21T22:31:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2013:0169"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "vino-preferences does not warn about UPnP especially with no password and no confirmation."
    },
    {
      "cve": "CVE-2012-4429",
      "discovery_date": "2012-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "857250"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "vino: information leak and authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
          "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
          "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-4429"
        },
        {
          "category": "external",
          "summary": "RHBZ#857250",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857250"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4429",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-4429"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4429",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4429"
        }
      ],
      "release_date": "2012-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2013-01-21T22:31:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2013:0169"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Client-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Client-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Server-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Server-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.src",
            "6Workstation-6.3.z:vino-0:2.28.1-8.el6_3.x86_64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.i686",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.ppc64",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.s390x",
            "6Workstation-6.3.z:vino-debuginfo-0:2.28.1-8.el6_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "vino: information leak and authentication bypass"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…