Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-5745 (GCVE-0-2013-5745)
Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-08-06 17:22- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:22:30.780Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55090"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-09-30T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-12-01T17:26:34.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55090"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5745",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55090"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-5745",
"datePublished": "2013-10-01T17:00:00.000Z",
"dateReserved": "2013-09-16T00:00:00.000Z",
"dateUpdated": "2024-08-06T17:22:30.780Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2013-5745
Vulnerability from fkie_nvd - Published: 2013-10-01 17:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD2A524-DE56-4CF6-9C2D-B4507380696B",
"versionEndIncluding": "3.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5C926468-9247-4A7C-8105-561B91587C0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F85A7833-4818-467F-BCFF-CC7DE363E21A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "41927755-3E1C-4177-8977-F52B38F3E053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4B1AEB-B4BA-4215-9F2C-1700CD3111E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF482208-D0E6-457E-953F-6E2361350565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "552A7EEF-1909-4A23-98EF-81DF362C2248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
"matchCriteriaId": "2C62B9DA-E24F-4558-8B72-0C95A45A37BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
"matchCriteriaId": "543D8E9D-70D7-436B-9BDC-8A826A2299C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"matchCriteriaId": "8D559DA7-0530-48DC-A8EC-A2FBDC6CD06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E9ADA729-820E-475B-BF69-4C2448FDA12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"matchCriteriaId": "650B8890-EB29-4724-844F-4A32E050D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "730B2130-FB0E-48BA-B34A-C903ED08D76E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF5B01-4FCB-4403-8E88-3AF7B29CBE59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D612D4-00C9-4F36-846E-AAC0CFB6130C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA15D81-BB4B-4579-9F50-202A50229D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5337B18C-36F9-407F-B877-89D3D9F9B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E865590A-9C6D-44BE-A06F-C2EB89843654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A04843B1-63EE-4A23-97C1-AB1E107EB7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9764CB5E-B515-4996-AFDE-C0498F7E9008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB8036F-3B7A-401B-8274-40249D2AE2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0885B8D4-FE7D-4369-99DE-425A777FE075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "851E2AE4-7921-4F3B-BE9D-B38AB9AACBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD32A6-7CAD-410F-B69B-647800AA7CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"matchCriteriaId": "8A35E8F1-E5E4-43E8-8600-2A99C04C3D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "31133388-2D96-4524-99AD-AA68BA77241B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "38EC1414-090D-4C68-87A7-27B008368EBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "34F405B9-E543-40DB-8421-D529615FE3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DF93A176-DE41-4E97-9811-23C6D2E3FA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "00576CED-5848-4BD6-B243-47BC53DDAF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8F2CFF-1100-4F39-8081-04CDEAFA0A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B76C84-3BB3-4698-A65F-66DDF1EA7D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF372DB5-2DC8-4D51-8238-91259B8F6DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD934ED-727D-4F76-BEFB-8BC6289E6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CE80D282-639F-4B3B-917F-78C9E2DE9ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"matchCriteriaId": "477A4038-A94F-4D67-94A5-9AF755164B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F9ABA30A-CCEB-452C-8CDF-71BF8BA54328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "618D194C-D298-4C09-9F60-35719011B7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4D61AFC5-B296-45C8-8032-DAAA77FF8B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7914FF1F-E098-4359-A90E-6317648139C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7549E435-4C0B-461D-811F-7291540E28D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"matchCriteriaId": "77F69530-C2BF-4EC5-A0B1-305C1EF734EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "518CBBF2-0F03-4700-A571-3F1FC7A36E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9200DB-5A3A-458D-A57E-176A6243ADDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B163B52F-7A94-4F7C-873D-61F031043701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "823D1043-98CF-4406-AEA0-988A3139E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEE04E0-8E35-4A20-972F-28AAEA033C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADDF708-0EC8-473A-9FA3-F94EE8939D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F65CD5-2ED0-4BFE-B267-04908843B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2DD4B9-322D-4D05-A3E6-56BBA8C732F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FFA5A6-5378-45CB-9360-FFEAC67DCCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E18BEF6E-3749-4E7E-8A34-F6577204BC28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E077DC55-D51B-4408-9746-FA88DCA39938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0DAA31-709E-40D0-805C-01FE87CDCD26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "C1772115-C603-4A11-8489-321120B8A1B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "859A4E2E-BD8E-4787-8E10-DA420F4193BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"matchCriteriaId": "986576AE-C3B3-4161-BEDF-4CC9584EACC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCD3F9-AB94-4DD5-B6D0-CB8C66091134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F07686-3E95-43DA-AD01-90E33D71AB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2CDDB3-ADFD-4B83-94ED-CB2A632956F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9107C16B-47A2-4906-BC07-F1FC869AFA3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2973DE8A-A346-44B5-B56D-EC33115FC548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B854925C-5F29-491D-AC8B-87EC53EA2ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87C4C344-2028-453A-B66A-D7AE46C01C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7310615E-BDC8-48D5-A8E4-53808E67AA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"matchCriteriaId": "1A60F4AC-7C1D-4FD3-A4AF-872082093609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA78F1-5331-4782-B158-CE1CEA929429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41EDE1-BCA4-4E2F-B655-DFF040DDABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "42F6A115-01FB-4F44-880A-60DFEBFD7504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C9856E-B1E6-4E36-9758-8CFA9ADD9303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C762D77-E35F-4F0F-BAB3-D325D769DBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA2BE3-439E-4F5F-9AFE-F02BE8882F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8037FB93-8B30-4AFA-A391-2110D40CFF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC199D2-B527-484A-9215-6490952E1865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"matchCriteriaId": "929A2439-2644-4F92-9873-A2D1041C6C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"matchCriteriaId": "972490D5-7AF3-4EB2-B6C1-8A9C66F6889E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "71E9E6F4-FF60-4DDB-9F65-10D0B973E633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE96879-862B-4D72-9194-9278B88D3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "936EAF0C-141D-4DC1-92AD-EA4D34EEC2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "02067880-F0F2-4645-997E-203BF961843F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB23370-FE95-4810-9490-B9444872E3FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"matchCriteriaId": "037AC3F1-E3F1-424C-86F7-CAB1F6D6B9F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65FE82D9-9B70-4D30-B64A-DAE742734719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBD543C-19C0-4AF2-9E87-28758BD865D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B65A78-2D06-4800-9A70-F517B4BF09A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71B91D70-01CD-412F-A0BF-0F1104E0D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4965C3B8-A40F-4BD5-8D79-3968C128476A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA1C759-CAF5-491D-82E0-4498A9428862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B449160-54D4-4CB8-9591-4A805CE806E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCE5B7E-BF6E-4042-8DE9-0CD55B6089B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2D3D88-1870-4011-BB82-02C84ECD5817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBD087C-2AEC-4343-BD74-0F35C7BAD35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE1E16E-9022-4B32-A726-9184BE99A323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "09693B1E-9A1C-448A-A667-DB7E2A8FB5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA473C92-0623-4914-86B7-2A3D56C8EA55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B47D886F-F6D1-46F4-8E91-8EBA00D43505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02A882C6-7CF0-4588-8C28-86001744D93E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F0C4F-BD5C-4C8A-A1B6-A5514E8113C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6886A8-3F3D-4ABA-A3C6-A1F978F86B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1079328C-08E6-48BF-9885-EFC27B632382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "43E7339B-5457-4269-BB5E-8EA19D7283A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6BE890-270C-4B89-A60C-846862C917E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDEAEE9-EC39-4F08-A23C-19B465D402E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "684BA3AA-8858-4C04-89E1-FF379FBF9BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "68804C21-E455-4107-817F-34E877CC63E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8EEC2E-2051-4B1B-856D-F0AF0CB63993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F58B0BB-0662-4CB5-8C40-EFB08FBD02EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8FD528-3E50-4956-88ED-73F26F2978BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0387A219-D5EB-489B-BCF5-BFDD771EA15F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E4BFAD-B66B-478A-940C-CBABD7C0EF26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53F33E80-8A2A-4391-9683-C12553FB6FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DAABD80A-61A4-4858-8DB3-F7B677879E02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAE2EFC-75A5-4B4E-BA67-F1E781A56E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A23DA576-C113-410A-BA6E-4ABF5C0DC3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.5.90:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FB40B0-CF82-44BC-BA60-A427EF4E6C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.5.92:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F02E59-1E5D-4ACF-AA21-F4210E019B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB40778-70B6-4FD1-9EBB-F29F33D2009C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F76A5AA-8CAA-453C-B053-0FF739C59BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:david_king:vino:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3358E6AE-AA6D-4B60-8E9D-D23652D792FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
},
{
"lang": "es",
"value": "La funci\u00f3n vino_client_data_pending en vino-server.c de GNOME Vino 2.26.1, 2.32.1, 3.7.3 y anteriores, y 3.8 cuando el cifrado esta deshabilitado, no limpia los datos del cliente apropiadamente cuando un error causa que la conexi\u00f3n se cierre durante una autenticaci\u00f3n, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU y memoria) a trav\u00e9s de m\u00faltiples peticiones manipuladas durante la autenticaci\u00f3n."
}
],
"id": "CVE-2013-5745",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-01T17:55:03.727",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55090"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"source": "cve@mitre.org",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2014-AVI-112
Vulnerability from certfr_avis - Published: 2014-03-10 - Updated: 2014-03-10
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5718",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5718"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2013-4123",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4123"
},
{
"name": "CVE-2013-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5745"
},
{
"name": "CVE-2013-4231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4231"
},
{
"name": "CVE-2006-4810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4810"
},
{
"name": "CVE-2013-4164",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4164"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4408"
},
{
"name": "CVE-2014-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0397"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2013-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1418"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2012-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6150"
},
{
"name": "CVE-2013-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5717"
},
{
"name": "CVE-2013-6340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6340"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2013-6337",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6337"
},
{
"name": "CVE-2013-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0900"
},
{
"name": "CVE-2013-6339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6339"
},
{
"name": "CVE-2013-4363",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4363"
},
{
"name": "CVE-2013-5721",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2008-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0386"
},
{
"name": "CVE-2012-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4504"
},
{
"name": "CVE-2012-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2893"
},
{
"name": "CVE-2012-4505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4505"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2013-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4287"
},
{
"name": "CVE-2009-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0179"
},
{
"name": "CVE-2013-6338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6338"
},
{
"name": "CVE-2013-6336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6336"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4124",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4124"
},
{
"name": "CVE-2013-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
},
{
"name": "CVE-2013-2561",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2561"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2013-5719",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5719"
},
{
"name": "CVE-2013-7114",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7114"
},
{
"name": "CVE-2013-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1417"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2013-5722",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5722"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2013-5720",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5720"
},
{
"name": "CVE-2012-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2825"
},
{
"name": "CVE-2013-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4475"
}
],
"initial_release_date": "2014-03-10T00:00:00",
"last_revision_date": "2014-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-112",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nune ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 25 f\u00e9vrier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
GHSA-VJJ5-VM4P-GF6M
Vulnerability from github – Published: 2022-05-17 04:56 – Updated: 2022-05-17 04:56The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
{
"affected": [],
"aliases": [
"CVE-2013-5745"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-10-01T17:55:00Z",
"severity": "HIGH"
},
"details": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.",
"id": "GHSA-vjj5-vm4p-gf6m",
"modified": "2022-05-17T04:56:51Z",
"published": "2022-05-17T04:56:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5745"
},
{
"type": "WEB",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"type": "WEB",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"type": "WEB",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/55090"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1980-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2013-5745
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-5745",
"description": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.",
"id": "GSD-2013-5745",
"references": [
"https://www.suse.com/security/cve/CVE-2013-5745.html",
"https://access.redhat.com/errata/RHSA-2013:1452",
"https://advisories.mageia.org/CVE-2013-5745.html",
"https://linux.oracle.com/cve/CVE-2013-5745.html",
"https://packetstormsecurity.com/files/cve/CVE-2013-5745"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-5745"
],
"details": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.",
"id": "GSD-2013-5745",
"modified": "2023-12-13T01:22:21.503525Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5745",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "RHSA-2013:1452",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "55090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55090"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
"refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "USN-1980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "SUSE-SU-2013:1631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.4.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.28.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.28.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.5.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.5.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.7.4.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.32.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5745"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=707905",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=707905"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt",
"refsource": "MISC",
"tags": [],
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2013-028.txt"
},
{
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=641811",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=641811"
},
{
"name": "USN-1980-1",
"refsource": "UBUNTU",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1980-1"
},
{
"name": "55090",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55090"
},
{
"name": "RHSA-2013:1452",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1452.html"
},
{
"name": "SUSE-SU-2013:1631",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-12-01T04:31Z",
"publishedDate": "2013-10-01T17:55Z"
}
}
}
CVE-2013-5745
Vulnerability from fstec - Published: 01.10.2013{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS 3.0": null,
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "Server 11 SP2 (SUSE Linux Enterprise), Desktop 11 SP2 (SUSE Linux Enterprise)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0438 \u0441 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0435\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u043f\u043e \u0430\u0434\u0440\u0435\u0441\u0443: http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "01.10.2013",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.07.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.04.2015",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2015-04377",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2013-5745",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SUSE Linux Enterprise",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SUSE Linux Enterprise, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 vino \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SUSE Linux Enterprise, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
CVE-2013-5745
Vulnerability from fstec - Published: None{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS 3.0": null,
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "Server 11 SP2 (SUSE Linux Enterprise), Desktop 11 SP2 (SUSE Linux Enterprise)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0438 \u0441 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0435\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u043f\u043e \u0430\u0434\u0440\u0435\u0441\u0443: http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": null,
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "28.11.2016",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.04.2015",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2015-04378",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2013-5745",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SUSE Linux Enterprise",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SUSE Linux Enterprise, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 vino-lang \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SUSE Linux Enterprise, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.