Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-0169.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78602 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/09/14/1 | mailing list |
http://www.ubuntu.com/usn/USN-1701-1 | vendor advisory |
http://www.securityfocus.com/bid/55548 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/09/13/25 | mailing list |
http://secunia.com/advisories/50527 | third party advisory vendor advisory |