CVE-2013-5745
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
01/10/2013
Last modified:
11/04/2025
Description
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
Impact
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:* | 3.7.3 (including) | |
cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-1452.html
- http://secunia.com/advisories/55090
- http://www.ubuntu.com/usn/USN-1980-1
- https://bugzilla.gnome.org/show_bug.cgi?id=641811
- https://bugzilla.gnome.org/show_bug.cgi?id=707905
- https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-1452.html
- http://secunia.com/advisories/55090
- http://www.ubuntu.com/usn/USN-1980-1
- https://bugzilla.gnome.org/show_bug.cgi?id=641811
- https://bugzilla.gnome.org/show_bug.cgi?id=707905
- https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt