CVE-2011-1165

Impact:
Low
Public Date:
2009-09-08
Bugzilla:
678846: CVE-2011-1165 vino-preferences does not warn about UPnP especially with no password and no confirmation.

The MITRE CVE dictionary describes this issue as:

Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.

Find out more about CVE-2011-1165 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the version of vino as shipped with Red Hat Enterprise Linux 4 or 5 as they did not include support for Universal Plug and Play (UPnP). A future update in Red Hat Enterprise Linux 6 may address this flaw. To mitigate this issue, users should ensure that confirmation is requested on each inbound connection attempt, that a password is required to connect, and that automatic network configuration is disabled. This will prevent vino from using UPnP to allow access to the VNC port, and will ensure that any connections require a password and that the user is notified on any connection attempts.

CVSS v2 metrics

Base Score 4.6
Base Metrics AV:N/AC:H/Au:S/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (vino) RHSA-2013:0169 2013-01-21

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 vino Not affected
Red Hat Enterprise Linux 4 vino Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.