This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
It was found that Vino transmitted all clipboard activity on the
system running Vino to all clients connected to port 5900, even those
who had not authenticated. A remote attacker who is able to access
port 5900 on a system running Vino could use this flaw to read
clipboard data without authenticating. (CVE-2012-4429)
Two out-of-bounds memory read flaws were found in the way Vino
processed client framebuffer requests in certain encodings. An
authenticated client could use these flaws to send a specially crafted
request to Vino, causing it to crash. (CVE-2011-0904, CVE-2011-0905)
In certain circumstances, the vino-preferences dialog box incorrectly
indicated that Vino was only accessible from the local network. This
could confuse a user into believing connections from external networks
are not allowed (even when they are allowed). With this update,
vino-preferences no longer displays connectivity and reachable
There was no warning that Universal Plug and Play (UPnP) was used to
open ports on a user's network router when the 'Configure network
automatically to accept connections' option was enabled (it is
disabled by default) in the Vino preferences. This update changes the
option's description to avoid the risk of a UPnP router configuration
change without the user's consent. (CVE-2011-1165)
The GNOME session must be restarted (log out, then log back in) for
this update to take effect.
See also :
Update the affected vino and / or vino-debuginfo packages.
Risk factor :
Medium / CVSS Base Score : 5.1
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 63664 ()
CVE ID: CVE-2011-0904CVE-2011-0905CVE-2011-1164CVE-2011-1165CVE-2012-4429
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.