Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-7225

Опубликовано: 18 фев. 2018
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libvncserverWill not fix
Red Hat Enterprise Linux 7libvncserverFixedRHSA-2018:105510.04.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-805
https://bugzilla.redhat.com/show_bug.cgi?id=1546858libvncserver: Improper input sanitization in rfbProcessClientNormalMessage in rfbserver.c

EPSS

Процентиль: 87%
0.03567
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.

CVSS3: 9.8
nvd
больше 7 лет назад

An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.

CVSS3: 9.8
debian
больше 7 лет назад

An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClie ...

suse-cvrf
больше 7 лет назад

Security update for LibVNCServer

CVSS3: 9.8
github
больше 3 лет назад

An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.

EPSS

Процентиль: 87%
0.03567
Низкий

5.4 Medium

CVSS3