Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 486694 (CVE-2013-5745) - <net-misc/vino-2.32.2-r2 : Infinite Loop Denial of Service Vulnerability (CVE-2013-5745)
Summary: <net-misc/vino-2.32.2-r2 : Infinite Loop Denial of Service Vulnerability (CVE...
Status: RESOLVED FIXED
Alias: CVE-2013-5745
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/54995/
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-10-01 19:00 UTC by Agostino Sarubbo
Modified: 2013-12-18 07:46 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-10-01 19:00:33 UTC
From ${URL} :

Description

Trustwave SpiderLabs has reported a vulnerability in Vino, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the "vino_server_client_data_pending()" function (server/vino-server.c), which can be exploited to trigger an infinite 
loop via specially crafted packets.

The vulnerability is reported in versions prior to 3.9.92.


Solution:
Update to version 3.9.92 or later.

Provided and/or discovered by:
Robert Foggia, TrustWave SpiderLabs.

Original Advisory:
Vino:
https://mail.gnome.org/archives/gnome-announce-list/2013-September/msg00025.html

TWSL2013-028:
http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0103.html




@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Alexandre Rostovtsev (RETIRED) gentoo-dev 2013-10-01 21:42:53 UTC
+*vino-2.32.2-r2 (01 Oct 2013)
+
+  01 Oct 2013; Alexandre Rostovtsev <tetromino@gentoo.org>
+  +vino-2.32.2-r2.ebuild, -vino-3.8.1.ebuild:
+  Fix DoS vulnerability and remove vulnerable version (CVE-2013-5745, bug
+  #486694, thanks to Agostino Sarubbo).

Thanks, this had already been fixed in 3.8.1-r1, and I've now added 2.32.2-r2 to use the same patch.

=net-misc/vino-2.32.2-r2 should be stabilized.
Comment 2 Agostino Sarubbo gentoo-dev 2013-10-02 06:27:08 UTC
Arches, please test and mark stable:                                                                                                           
=net-misc/vino-2.32.2-r2                                                                                  
Target keywords : "alpha amd64 arm ia64 ppc ppc64 sparc x86"
Comment 3 Agostino Sarubbo gentoo-dev 2013-10-02 12:07:51 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2013-10-02 12:09:00 UTC
x86 stable
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2013-10-02 14:52:30 UTC
CVE-2013-5745 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5745):
  The vino_server_client_data_pending function in vino-server.c in GNOME Vino
  2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled,
  does not properly clear client data when an error causes the connection to
  close during authentication, which allows remote attackers to cause a denial
  of service (infinite loop, CPU and disk consumption) via multiple crafted
  requests during authentication.
Comment 6 Agostino Sarubbo gentoo-dev 2013-10-06 10:12:30 UTC
ia64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2013-10-06 15:19:01 UTC
alpha stable
Comment 8 Agostino Sarubbo gentoo-dev 2013-10-07 19:29:39 UTC
ppc stable
Comment 9 Agostino Sarubbo gentoo-dev 2013-10-09 11:17:26 UTC
arm stable
Comment 10 Agostino Sarubbo gentoo-dev 2013-10-09 11:18:29 UTC
ppc64 stable
Comment 11 Agostino Sarubbo gentoo-dev 2013-12-17 15:02:46 UTC
sparc stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 12 Chris Reffett gentoo-dev Security 2013-12-17 17:22:49 UTC
GLSA vote: no.
Comment 13 Pacho Ramos gentoo-dev 2013-12-17 20:01:49 UTC
+  17 Dec 2013; Pacho Ramos <pacho@gentoo.org> -vino-2.32.2-r1.ebuild:
+  Drop old
+
Comment 14 Sergey Popov gentoo-dev Security 2013-12-18 07:46:19 UTC
Thanks for your work

GLSA vote: no

Closing as noglsa