Your message dated Thu, 09 Apr 2009 17:12:46 +0000
with message-id <e1lrxny-0003oh...@ries.debian.org>
and subject line Bug#513531: fixed in vnc4 4.1.1+X4.3.0-21+etch1
has caused the Debian Bug report #513531,
regarding CVE-2008-4770: Arbitrary code execution via crafted RFB protocol data
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
513531: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513531
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xvnc4viewer
Severity: grave
Tags: security, patch
Justification: user security hole
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for vnc4.
CVE-2008-4770[0]:
| The CMsgReader::readRect function in the VNC Viewer component in
| RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0
| through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote
| VNC servers to execute arbitrary code via crafted RFB protocol data,
| related to "encoding type."
The upstream patch[1] can be found in the redhat bugreport[2].
For lenny, this could be fixed via migration from unstable. Please CC
secure-testing-t...@lists.alioth.debian.org when you email the release
team and ask for the unblock, so we are kept in the loop.
I guess the issue is also severe enough to warrant a DSA update. I
haven't tried to exploit it yet though.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
Cheers
Steffen
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770
http://security-tracker.debian.net/tracker/CVE-2008-4770
[1] https://bugzilla.redhat.com/attachment.cgi?id=329323
[2] https://bugzilla.redhat.com/show_bug.cgi?id=480590
--- End Message ---
--- Begin Message ---
Source: vnc4
Source-Version: 4.1.1+X4.3.0-21+etch1
We believe that the bug you reported is fixed in the latest version of
vnc4, which is due to be installed in the Debian FTP archive:
vnc4-common_4.1.1+X4.3.0-21+etch1_i386.deb
to pool/main/v/vnc4/vnc4-common_4.1.1+X4.3.0-21+etch1_i386.deb
vnc4_4.1.1+X4.3.0-21+etch1.diff.gz
to pool/main/v/vnc4/vnc4_4.1.1+X4.3.0-21+etch1.diff.gz
vnc4_4.1.1+X4.3.0-21+etch1.dsc
to pool/main/v/vnc4/vnc4_4.1.1+X4.3.0-21+etch1.dsc
vnc4server_4.1.1+X4.3.0-21+etch1_i386.deb
to pool/main/v/vnc4/vnc4server_4.1.1+X4.3.0-21+etch1_i386.deb
xvnc4viewer_4.1.1+X4.3.0-21+etch1_i386.deb
to pool/main/v/vnc4/xvnc4viewer_4.1.1+X4.3.0-21+etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 513...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Steffen Joeris <wh...@debian.org> (supplier of updated vnc4 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 30 Jan 2009 19:09:27 +0000
Source: vnc4
Binary: vnc4-common vnc4server xvnc4viewer
Architecture: source i386
Version: 4.1.1+X4.3.0-21+etch1
Distribution: stable-security
Urgency: high
Maintainer: Ola Lundqvist <o...@debian.org>
Changed-By: Steffen Joeris <wh...@debian.org>
Description:
vnc4-common - Virtual network computing server software
vnc4server - Virtual network computing server software
xvnc4viewer - Virtual network computing client software for X
Closes: 513531
Changes:
vnc4 (4.1.1+X4.3.0-21+etch1) stable-security; urgency=high
.
* Non-maintainer upload by the security team
* Fix arbitrary code execution via crafted RFB protocol data
(Closes: #513531)
Fixes: CVE-2008-4770
Files:
0d0f0e7f58c6440481b8bfa83af8cd63 696 x11 optional
vnc4_4.1.1+X4.3.0-21+etch1.dsc
b28c43385fe574d612ddbd0b645082f7 31536534 x11 optional
vnc4_4.1.1+X4.3.0.orig.tar.gz
55c92400d7949023c3488dcec680d613 50904 x11 optional
vnc4_4.1.1+X4.3.0-21+etch1.diff.gz
a1e67da97e85e0ca290e3644b551c686 2015342 x11 optional
vnc4server_4.1.1+X4.3.0-21+etch1_i386.deb
9cedf57dd52455c76332f585f6c52dc8 147628 net optional
xvnc4viewer_4.1.1+X4.3.0-21+etch1_i386.deb
27cf156a68540519f9efd4b81fd51dff 18640 x11 optional
vnc4-common_4.1.1+X4.3.0-21+etch1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkmDgXMACgkQ62zWxYk/rQc9RwCfWmEkYOwlTTqsjqFXkaVp3gge
HvUAoLsx2j6gSktmnafxfolx73leqoDX
=+/6F
-----END PGP SIGNATURE-----
--- End Message ---