==========================================================================
Ubuntu Security Notice USN-3203-1
February 20, 2017
gtk-vnc vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
gtk-vnc could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
– gtk-vnc: VNC viewer widget
Details:
It was discovered that gtk-vnc incorrectly validated certain data. A
malicious server could use this issue to cause gtk-vnc to crash, resulting
in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libgtk-vnc-1.0-0 0.5.3-0ubuntu2.1
libgtk-vnc-2.0-0 0.5.3-0ubuntu2.1
libgvnc-1.0-0 0.5.3-0ubuntu2.1
Ubuntu 12.04 LTS:
libgtk-vnc-1.0-0 0.5.0-1ubuntu1.1
libgtk-vnc-2.0-0 0.5.0-1ubuntu1.1
libgvnc-1.0-0 0.5.0-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3203-1
CVE-2017-5884, CVE-2017-5885
Package Information:
https://launchpad.net/ubuntu/+source/gtk-vnc/0.5.3-0ubuntu2.1
https://launchpad.net/ubuntu/+source/gtk-vnc/0.5.0-1ubuntu1.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJYqzjEAAoJEGVp2FWnRL6TXfYQALDVxUl8G5hZZm6zldH8UV4s
0iwQHseMTS139pvH41Efu02tRgBVLsHy5cAmiy+EzfizZRO+pZyMIDBFPPIpT+LE
ouBI1JfnZ9gaQcww5y1qAzZ/h6QRon9Mph+3Iqn22Q+lc5SyZ73/BnIS2JyjiqBy
8nknYP0KxUae+XJVT/lClWSII+YZt0CshVD7m70Vzb1hOvhF+uottD/lBYtUJGAA
+GnjM6BkWh/eEFI0Y5rP5U8aG2zDQDWzO3ky/FHYOxRiJNwIXxWulfHploppTMKs
BRkacGUSG9rXXpDpASJ1vvzFgJEiZQ/LSaTO0QUIwoWbVP7P337VHs1fy1m7ohQu
Ks21/4hudUsRp2V72Ju7xvUEB8910G2GVUzuev3BixTJUR4Q5mbYw5qCEW2Of/ex
CE8a2/lSashHiSHs4DecQ+YSKBG9IFKnNm+GGtYze4xEdNN5QP1kjCPuqRURvrU0
zmotV2jvZlSBgn/JkxXxHuyBmvpTbRrDYfO4YDRcR49i7U8i0ilruPKoLznQHPVe
bELO9Vrf8UT47XDnjY3jo+yPnTqwEzzRCM8QeB18928qaAXQYDbWNDiH0kYkk2fy
uSvMw/0ra3cOasbCJMAxcSkfjzvKoSaQmvI1yRdKSAsX24e0a6Qt/RyFCKhbvdrf
L5PyHivUEbeoN/kkOzzV
=zRQN
—–END PGP SIGNATURE—–
—