|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for gtk-vnc RHSA-2017:2258-01|
|Summary:||The remote host is missing an update for the 'gtk-vnc'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'gtk-vnc'
package(s) announced via the referenced advisory.
The gtk-vnc packages provide a VNC viewer
widget for GTK. The gtk-vnc widget is built by using co-routines, which allows
the widget to be completely asynchronous while remaining single-threaded. The
following packages have been upgraded to a later upstream version: gtk-vnc
(0.7.0). (BZ#1416783) Security Fix(es): * It was found that gtk-vnc lacked
proper bounds checking while processing messages using RRE, hextile, or copyrect
encodings. A remote malicious VNC server could use this flaw to crash VNC
viewers which are based on the gtk-vnc library. (CVE-2017-5884) * An integer
overflow flaw was found in gtk-vnc. A remote malicious VNC server could use this
flaw to crash VNC viewers which are based on the gtk-vnc library.
(CVE-2017-5885) Additional Changes: For detailed information on changes in this
release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the
gtk-vnc on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-5884|
BugTraq ID: 96016
RedHat Security Advisories: RHSA-2017:2258
Common Vulnerability Exposure (CVE) ID: CVE-2017-5885
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.