Ubuntu Security Notice 4573-1 - Nicolas Ruff discovered that Vino incorrectly handled large ClientCutText messages. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. It was discovered that Vino incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain sensitive information, cause a denial of service, or execute arbitrary code. Various other issues were also addressed.
d1c1dec0425b1351154dbc2e5d1e29f09c8665e1b8c90126af657be592658be8
==========================================================================
Ubuntu Security Notice USN-4573-1
October 07, 2020
vino vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Vino.
Software Description:
- vino: VNC server for GNOME
Details:
Nicolas Ruff discovered that Vino incorrectly handled large ClientCutText
messages. A remote attacker could use this issue to cause the server to
crash, resulting in a denial of service. (CVE-2014-6053)
It was discovered that Vino incorrectly handled certain packet lengths. A
remote attacker could possibly use this issue to obtain sensitive
information, cause a denial of service, or execute arbitrary code.
(CVE-2018-7225)
Pavel Cheremushkin discovered that an information disclosure vulnerability
existed in Vino when sending a ServerCutText message. An attacker could
possibly use this issue to expose sensitive information. (CVE-2019-15681)
It was discovered that Vino incorrectly handled region clipping. A remote
attacker could possibly use this issue to cause Vino to crash, resulting in
a denial of service. (CVE-2020-14397)
It was discovered that Vino incorrectly handled encodings. A remote
attacker could use this issue to cause Vino to crash, resulting in a denial
of service, or possibly execute arbitrary code. (CVE-2020-14402,
CVE-2020-14403, CVE-2020-14404)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
vino 3.22.0-5ubuntu2.1
Ubuntu 18.04 LTS:
vino 3.22.0-3ubuntu1.1
Ubuntu 16.04 LTS:
vino 3.8.1-0ubuntu9.3
After a standard system update you need to restart your session to make all
the necessary changes.
References:
https://usn.ubuntu.com/4573-1
CVE-2014-6053, CVE-2018-7225, CVE-2019-15681, CVE-2020-14397,
CVE-2020-14402, CVE-2020-14403, CVE-2020-14404
Package Information:
https://launchpad.net/ubuntu/+source/vino/3.22.0-5ubuntu2.1
https://launchpad.net/ubuntu/+source/vino/3.22.0-3ubuntu1.1
https://launchpad.net/ubuntu/+source/vino/3.8.1-0ubuntu9.3