|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for vino RHSA-2013:1452-01|
|Summary:||The remote host is missing an update for the 'vino'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'vino'
package(s) announced via the referenced advisory.
Vino is a Virtual Network Computing (VNC) server for GNOME. It allows
remote users to connect to a running GNOME session using VNC.
A denial of service flaw was found in the way Vino handled certain
authenticated requests from clients that were in the deferred state. A
remote attacker could use this flaw to make the vino-server process enter
an infinite loop when processing those incoming requests. (CVE-2013-5745)
All vino users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. The GNOME session must be
restarted (log out, then log back in) for this update to take effect.
vino on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-5745|
RedHat Security Advisories: RHSA-2013:1452
SuSE Security Announcement: SUSE-SU-2013:1631 (Google Search)
|Copyright||Copyright (c) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.