Description
The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Published: 2011-05-10
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2238-1 vino security update
EUVD EUVD EUVD-2011-0916 The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
Ubuntu USN Ubuntu USN USN-1128-1 Vino vulnerabilities
References
Link Providers
http://ftp.gnome.org/pub/GNOME/sources/vino/2.28/vino-2.28.3.news cve-icon cve-icon
http://ftp.gnome.org/pub/GNOME/sources/vino/2.32/vino-2.32.2.news cve-icon cve-icon
http://ftp.gnome.org/pub/GNOME/sources/vino/3.0/vino-3.0.2.news cve-icon cve-icon
http://git.gnome.org/browse/vino/commit/?id=0c2c9175963fc56bf2af10e42867181332f96ce0 cve-icon cve-icon
http://git.gnome.org/browse/vino/commit/?id=456dadbb5c5971d3448763a44c05b9ad033e522f cve-icon cve-icon
http://git.gnome.org/browse/vino/commit/?id=8beefcf7792d343c10c919ee0c928c81f73b1279 cve-icon cve-icon
http://git.gnome.org/browse/vino/commit/?id=d050a22b1c284b633c407ef92fde95c47e8fdb8a cve-icon cve-icon
http://git.gnome.org/browse/vino/commit/?id=dff52694a384fe95195f2211254026b752d63ec4 cve-icon cve-icon
http://git.gnome.org/browse/vino/commit/?id=e17bd4e369f90748654e31a4867211dc7610975d cve-icon cve-icon
http://git.gnome.org/browse/vino/log/?h=gnome-2-30 cve-icon cve-icon
http://git.gnome.org/browse/vino/tree/NEWS cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2013-0169.html cve-icon cve-icon
http://secunia.com/advisories/44410 cve-icon cve-icon
http://secunia.com/advisories/44463 cve-icon cve-icon
http://www.debian.org/security/2011/dsa-2238 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2011:087 cve-icon cve-icon
http://www.securityfocus.com/bid/47681 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-1128-1/ cve-icon cve-icon
http://www.vupen.com/english/advisories/2011/1144 cve-icon cve-icon
https://bugzilla.gnome.org/show_bug.cgi?id=641802 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=694455 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/67243 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2011-0904 cve-icon
https://www.cve.org/CVERecord?id=CVE-2011-0904 cve-icon
History

No history.

Subscriptions

David King Vino
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T22:05:54.511Z

Reserved: 2011-02-08T00:00:00.000Z

Link: CVE-2011-0904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2011-05-10T18:55:01.263

Modified: 2026-04-29T01:13:23.040

Link: CVE-2011-0904

cve-icon Redhat

Severity : Low

Publid Date: 2011-05-02T00:00:00Z

Links: CVE-2011-0904 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses