Vino is a Virtual Network Computing (VNC) server for GNOME. It allows remote users to connect to a running GNOME session using VNC. It was found that Vino transmitted all clipboard activity on the system running Vino to all clients connected to port 5900, even those who had not authenticated. A remote attacker who is able to access port 5900 on a system running Vino could use this flaw to read clipboard data without authenticating. (CVE-2012-4429) Two out-of-bounds memory read flaws were found in the way Vino processed client framebuffer requests in certain encodings. An authenticated client could use these flaws to send a specially-crafted request to Vino, causing it to crash. (CVE-2011-0904, CVE-2011-0905) In certain circumstances, the vino-preferences dialog box incorrectly indicated that Vino was only accessible from the local network. This could confuse a user into believing connections from external networks are not allowed (even when they are allowed). With this update, vino-preferences no longer displays connectivity and reachable information. (CVE-2011-1164) There was no warning that Universal Plug and Play (UPnP) was used to open ports on a user’s network router when the “Configure network automatically to accept connections” option was enabled (it is disabled by default) in the Vino preferences. This update changes the option’s description to avoid the risk of a UPnP router configuration change without the user’s consent. (CVE-2011-1165) All Vino users should upgrade to this updated package, which contains backported patches to resolve these issues. The GNOME session must be restarted (log out, then log back in) for this update to take effect.
ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0
git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f
git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279
git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a
git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4
git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d
git.gnome.org/browse/vino/log/?h=gnome-2-30
git.gnome.org/browse/vino/tree/NEWS
lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
rhn.redhat.com/errata/RHSA-2013-0169.html
secunia.com/advisories/44410
secunia.com/advisories/44463
www.debian.org/security/2011/dsa-2238
www.mandriva.com/security/advisories?name=MDVSA-2011:087
www.securityfocus.com/bid/47681
www.ubuntu.com/usn/usn-1128-1/
www.vupen.com/english/advisories/2011/1144
access.redhat.com/security/updates/classification/#moderate
bugzilla.gnome.org/show_bug.cgi?id=641803
bugzilla.redhat.com/show_bug.cgi?id=694456
exchange.xforce.ibmcloud.com/vulnerabilities/67244
rhn.redhat.com/errata/RHSA-2013-0169.html