tags 514360 + patch
thanks

* Helge Kreutzmann <deb...@helgefjell.de> [2009-02-06 19:07]:
> Please see
> http://www.heise-online.co.uk/news/Vulnerabilities-in-UltraVNC-and-TightVNC--/112562
> for a description. 1.3.9 is affected, while 1.3.10 is fixed. I did not
> verify the Debian version to be affected but believe so.
> 
> According to the linked advisories this is
> 
>  Class: Integer overflow
>  Remotely Exploitable: Yes
>  Locally Exploitable: No
>  Bugtraq ID: 33568
>  CVE Name: CVE-2009-0388
[...] 

Upstream patch:
http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564

Please reference the CVE id in the changelog if you fix 
this.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp6jreG0487W.pgp
Description: PGP signature

Reply via email to