Your message dated Thu, 09 Apr 2009 17:12:46 +0000
with message-id <e1lrxny-0003oh...@ries.debian.org>
and subject line Bug#513531: fixed in vnc4 4.1.1+X4.3.0-21+etch1
has caused the Debian Bug report #513531,
regarding CVE-2008-4770: Arbitrary code execution via crafted RFB protocol data
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
513531: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513531
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xvnc4viewer
Severity: grave
Tags: security, patch
Justification: user security hole

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for vnc4.

CVE-2008-4770[0]:
| The CMsgReader::readRect function in the VNC Viewer component in
| RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0
| through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote
| VNC servers to execute arbitrary code via crafted RFB protocol data,
| related to "encoding type."

The upstream patch[1] can be found in the redhat bugreport[2].

For lenny, this could be fixed via migration from unstable. Please CC
secure-testing-t...@lists.alioth.debian.org when you email the release
team and ask for the unblock, so we are kept in the loop.

I guess the issue is also severe enough to warrant a DSA update. I
haven't tried to exploit it yet though.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Cheers
Steffen

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770
    http://security-tracker.debian.net/tracker/CVE-2008-4770
[1] https://bugzilla.redhat.com/attachment.cgi?id=329323
[2] https://bugzilla.redhat.com/show_bug.cgi?id=480590



--- End Message ---
--- Begin Message ---
Source: vnc4
Source-Version: 4.1.1+X4.3.0-21+etch1

We believe that the bug you reported is fixed in the latest version of
vnc4, which is due to be installed in the Debian FTP archive:

vnc4-common_4.1.1+X4.3.0-21+etch1_i386.deb
  to pool/main/v/vnc4/vnc4-common_4.1.1+X4.3.0-21+etch1_i386.deb
vnc4_4.1.1+X4.3.0-21+etch1.diff.gz
  to pool/main/v/vnc4/vnc4_4.1.1+X4.3.0-21+etch1.diff.gz
vnc4_4.1.1+X4.3.0-21+etch1.dsc
  to pool/main/v/vnc4/vnc4_4.1.1+X4.3.0-21+etch1.dsc
vnc4server_4.1.1+X4.3.0-21+etch1_i386.deb
  to pool/main/v/vnc4/vnc4server_4.1.1+X4.3.0-21+etch1_i386.deb
xvnc4viewer_4.1.1+X4.3.0-21+etch1_i386.deb
  to pool/main/v/vnc4/xvnc4viewer_4.1.1+X4.3.0-21+etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 513...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steffen Joeris <wh...@debian.org> (supplier of updated vnc4 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 30 Jan 2009 19:09:27 +0000
Source: vnc4
Binary: vnc4-common vnc4server xvnc4viewer
Architecture: source i386
Version: 4.1.1+X4.3.0-21+etch1
Distribution: stable-security
Urgency: high
Maintainer: Ola Lundqvist <o...@debian.org>
Changed-By: Steffen Joeris <wh...@debian.org>
Description: 
 vnc4-common - Virtual network computing server software
 vnc4server - Virtual network computing server software
 xvnc4viewer - Virtual network computing client software for X
Closes: 513531
Changes: 
 vnc4 (4.1.1+X4.3.0-21+etch1) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Fix arbitrary code execution via crafted RFB protocol data
     (Closes: #513531)
     Fixes: CVE-2008-4770
Files: 
 0d0f0e7f58c6440481b8bfa83af8cd63 696 x11 optional 
vnc4_4.1.1+X4.3.0-21+etch1.dsc
 b28c43385fe574d612ddbd0b645082f7 31536534 x11 optional 
vnc4_4.1.1+X4.3.0.orig.tar.gz
 55c92400d7949023c3488dcec680d613 50904 x11 optional 
vnc4_4.1.1+X4.3.0-21+etch1.diff.gz
 a1e67da97e85e0ca290e3644b551c686 2015342 x11 optional 
vnc4server_4.1.1+X4.3.0-21+etch1_i386.deb
 9cedf57dd52455c76332f585f6c52dc8 147628 net optional 
xvnc4viewer_4.1.1+X4.3.0-21+etch1_i386.deb
 27cf156a68540519f9efd4b81fd51dff 18640 x11 optional 
vnc4-common_4.1.1+X4.3.0-21+etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkmDgXMACgkQ62zWxYk/rQc9RwCfWmEkYOwlTTqsjqFXkaVp3gge
HvUAoLsx2j6gSktmnafxfolx73leqoDX
=+/6F
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to