Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:14235-1

Опубликовано: 29 нояб. 2019
Источник: suse-cvrf

Описание

Security update for tightvnc

This update for tightvnc fixes the following issues:

  • CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection which might lead to code execution (bsc#1155476).
  • CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which might lead to code execution (bsc#1155472).
  • CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which could have led to denial of service (bsc#1155452).
  • CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler (bsc#1155442).

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
tightvnc-1.3.9-81.15.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS
tightvnc-1.3.9-81.15.3.1

Описание

TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:tightvnc-1.3.9-81.15.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS:tightvnc-1.3.9-81.15.3.1

Ссылки

Описание

TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:tightvnc-1.3.9-81.15.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS:tightvnc-1.3.9-81.15.3.1

Ссылки

Описание

TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:tightvnc-1.3.9-81.15.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS:tightvnc-1.3.9-81.15.3.1

Ссылки

Описание

TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:tightvnc-1.3.9-81.15.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS:tightvnc-1.3.9-81.15.3.1

Ссылки