Описание
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
A flaw was found in libvncserver. A heap-based buffer overflow within the websocket decoding functionality is possible, which can lead to exploitation by a malicious attacker to overwrite a function pointer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | libvncserver | Not affected | ||
| Red Hat Enterprise Linux 7 | libvncserver | Fixed | RHSA-2020:3281 | 03.08.2020 |
| Red Hat Enterprise Linux 8 | libvncserver | Fixed | RHSA-2020:3385 | 10.08.2020 |
| Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | libvncserver | Fixed | RHSA-2020:3588 | 01.09.2020 |
| Red Hat Enterprise Linux 8.1 Extended Update Support | libvncserver | Fixed | RHSA-2020:3456 | 17.08.2020 |
Показывать по
Дополнительная информация
Статус:
9.8 Critical
CVSS3
Связанные уязвимости
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 di ...
9.8 Critical
CVSS3