CVE-2011-0904
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
10/05/2011
Last modified:
11/04/2025
Description
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Impact
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
- http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
- http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
- http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0
- http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f
- http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279
- http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a
- http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4
- http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d
- http://git.gnome.org/browse/vino/log/?h=gnome-2-30
- http://git.gnome.org/browse/vino/tree/NEWS
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2013-0169.html
- http://secunia.com/advisories/44410
- http://secunia.com/advisories/44463
- http://www.debian.org/security/2011/dsa-2238
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A087
- http://www.securityfocus.com/bid/47681
- http://www.ubuntu.com/usn/usn-1128-1/
- http://www.vupen.com/english/advisories/2011/1144
- https://bugzilla.gnome.org/show_bug.cgi?id=641802
- https://bugzilla.redhat.com/show_bug.cgi?id=694455
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67243
- http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news
- http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news
- http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news
- http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0
- http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f
- http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279
- http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a
- http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4
- http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d
- http://git.gnome.org/browse/vino/log/?h=gnome-2-30
- http://git.gnome.org/browse/vino/tree/NEWS
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2013-0169.html
- http://secunia.com/advisories/44410
- http://secunia.com/advisories/44463
- http://www.debian.org/security/2011/dsa-2238
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A087
- http://www.securityfocus.com/bid/47681
- http://www.ubuntu.com/usn/usn-1128-1/
- http://www.vupen.com/english/advisories/2011/1144
- https://bugzilla.gnome.org/show_bug.cgi?id=641802
- https://bugzilla.redhat.com/show_bug.cgi?id=694455
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67243



