CVE-2011-0904

The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
References
Link Resource
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0 Patch
http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f Patch
http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279 Patch
http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a Patch
http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4 Patch
http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d Patch
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 Patch
http://git.gnome.org/browse/vino/tree/NEWS
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://rhn.redhat.com/errata/RHSA-2013-0169.html
http://secunia.com/advisories/44410 Vendor Advisory
http://secunia.com/advisories/44463 Vendor Advisory
http://www.debian.org/security/2011/dsa-2238
http://www.mandriva.com/security/advisories?name=MDVSA-2011:087
http://www.securityfocus.com/bid/47681
http://www.ubuntu.com/usn/usn-1128-1/
http://www.vupen.com/english/advisories/2011/1144 Vendor Advisory
https://bugzilla.gnome.org/show_bug.cgi?id=641802 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=694455 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67243
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0 Patch
http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f Patch
http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279 Patch
http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a Patch
http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4 Patch
http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d Patch
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 Patch
http://git.gnome.org/browse/vino/tree/NEWS
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://rhn.redhat.com/errata/RHSA-2013-0169.html
http://secunia.com/advisories/44410 Vendor Advisory
http://secunia.com/advisories/44463 Vendor Advisory
http://www.debian.org/security/2011/dsa-2238
http://www.mandriva.com/security/advisories?name=MDVSA-2011:087
http://www.securityfocus.com/bid/47681
http://www.ubuntu.com/usn/usn-1128-1/
http://www.vupen.com/english/advisories/2011/1144 Vendor Advisory
https://bugzilla.gnome.org/show_bug.cgi?id=641802 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=694455 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67243
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news - () http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news -
References () http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news - () http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news -
References () http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news - () http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news -
References () http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0 - Patch () http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0 - Patch
References () http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f - Patch () http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f - Patch
References () http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279 - Patch () http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279 - Patch
References () http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a - Patch () http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a - Patch
References () http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4 - Patch () http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4 - Patch
References () http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d - Patch () http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d - Patch
References () http://git.gnome.org/browse/vino/log/?h=gnome-2-30 - Patch () http://git.gnome.org/browse/vino/log/?h=gnome-2-30 - Patch
References () http://git.gnome.org/browse/vino/tree/NEWS - () http://git.gnome.org/browse/vino/tree/NEWS -
References () http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0169.html - () http://rhn.redhat.com/errata/RHSA-2013-0169.html -
References () http://secunia.com/advisories/44410 - Vendor Advisory () http://secunia.com/advisories/44410 - Vendor Advisory
References () http://secunia.com/advisories/44463 - Vendor Advisory () http://secunia.com/advisories/44463 - Vendor Advisory
References () http://www.debian.org/security/2011/dsa-2238 - () http://www.debian.org/security/2011/dsa-2238 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:087 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:087 -
References () http://www.securityfocus.com/bid/47681 - () http://www.securityfocus.com/bid/47681 -
References () http://www.ubuntu.com/usn/usn-1128-1/ - () http://www.ubuntu.com/usn/usn-1128-1/ -
References () http://www.vupen.com/english/advisories/2011/1144 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/1144 - Vendor Advisory
References () https://bugzilla.gnome.org/show_bug.cgi?id=641802 - Patch () https://bugzilla.gnome.org/show_bug.cgi?id=641802 - Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=694455 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=694455 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/67243 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/67243 -

Information

Published : 2011-05-10 18:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-0904

Mitre link : CVE-2011-0904

CVE.ORG link : CVE-2011-0904


JSON object : View

Products Affected

david_king

  • vino
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer