Format string vulnerability in the vinagre_utils_show_error function (src/vinagre-utils.c) in Vinagre 0.5.x before 0.5.2 and 2.x before 2.24.2 might allow remote attackers to execute arbitrary code via format string specifiers in a crafted URI or VNC server response.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/7401 | exploit |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00473.html | vendor advisory |
http://www.securityfocus.com/archive/1/499057/100/0/threaded | mailing list |
http://secunia.com/advisories/33041 | third party advisory vendor advisory |
http://www.coresecurity.com/content/vinagre-format-string | exploit |
http://secunia.com/advisories/33082 | third party advisory vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:240 | vendor advisory |
http://www.vupen.com/english/advisories/2008/3362 | vdb entry |
http://secunia.com/advisories/33046 | third party advisory vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00485.html | vendor advisory |
http://www.ubuntu.com/usn/usn-689-1 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=475070 |