Описание
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| tightvnc | fixed | 1:1.3.9-9.1 | package | |
| tightvnc | fixed | 1:1.3.9-9deb10u1 | buster | package |
| tightvnc | fixed | 1:1.3.9-9+deb9u1 | stretch | package |
Примечания
https://www.openwall.com/lists/oss-security/2018/12/10/5
https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7
part of CVE-2018-20748/libvncserver
Связанные уязвимости
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
Уязвимость реализации VNC с расширениями для оптимизации работы в условиях медленных каналов передачи данных Tightvnc, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании