CVE-2011-1165
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2011-1165 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This issue did not affect the version of vino as shipped with Red Hat Enterprise Linux 4 or 5 as they did not include support for Universal Plug and Play (UPnP). A future update in Red Hat Enterprise Linux 6 may address this flaw. To mitigate this issue, users should ensure that confirmation is requested on each inbound connection attempt, that a password is required to connect, and that automatic network configuration is disabled. This will prevent vino from using UPnP to allow access to the VNC port, and will ensure that any connections require a password and that the user is notified on any connection attempts.
CVSS v2 metrics
| Base Score | 4.6 |
|---|---|
| Base Metrics | AV:N/AC:H/Au:S/C:P/I:P/A:P |
| Access Vector | Network |
| Access Complexity | High |
| Authentication | Single |
| Confidentiality Impact | Partial |
| Integrity Impact | Partial |
| Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat Enterprise Linux 6 (vino) | RHSA-2013:0169 | 2013-01-21 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise Linux 5 | vino | Not affected |
| Red Hat Enterprise Linux 4 | vino | Not affected |
CVE description copyright © 2017, The MITRE Corporation
