Описание
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-15680
- https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08
- https://usn.ubuntu.com/4407-1
- https://www.openwall.com/lists/oss-security/2018/12/10/5
Связанные уязвимости
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
TightVNC code version 1.3.10 contains null pointer dereference in Hand ...
Уязвимость функции HandleZlibBPP реализации VNC с расширениями для оптимизации работы в условиях медленных каналов передачи данных Tightvnc, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании