Joined: 12 May 2004
|Posted: Fri Mar 06, 2009 10:26 pm Post subject: [ GLSA 200903-01 ] Vinagre: User-assisted execution of arbit
|Gentoo Linux Security Advisory
Title: Vinagre: User-assisted execution of arbitrary code (GLSA 200903-01)
Date: March 06, 2009
A format string error in Vinagre may allow for the execution of arbitrary
Vinagre is a VNC Client for the GNOME Desktop.
Vulnerable: < 0.5.2
Unaffected: >= 0.5.2
Architectures: All supported architectures
Alfredo Ortega (Core Security Technologies) reported a format string
error in the vinagre_utils_show_error() function in
A remote attacker could entice a user into opening a specially crafted
.vnc file or connecting to a malicious server, possibly resulting in
the remote execution of arbitrary code with the privileges of the user
running the application.
There is no known workaround at this time.
All Vinagre users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/vinagre-0.5.2"
Last edited by GLSA on Wed Sep 18, 2013 4:28 am; edited 2 times in total