Описание
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | code not present |
devel | DNE | |
esm-apps/bionic | not-affected | code not present |
esm-apps/xenial | released | 1:2.0.2+dfsg1-4ubuntu0.1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | |
devel | not-affected | |
esm-apps/bionic | not-affected | |
esm-apps/focal | not-affected | |
esm-apps/jammy | not-affected | |
esm-apps/noble | not-affected | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4:4.13.3-0ubuntu1.1]] |
focal | not-affected | |
groovy | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | |
devel | not-affected | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [0.9.9+dfsg-1ubuntu1.1]] |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | |
esm-infra/xenial | not-affected | |
focal | not-affected | |
groovy | not-affected | |
hirsute | not-affected | |
impish | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-apps/xenial | needs-triage | |
esm-infra-legacy/trusty | not-affected | 1.3.9-6.5+deb8u1build0.14.04.1~esm1 |
focal | ignored | end of standard support, was needs-triage |
groovy | ignored | end of life |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 3.22.0-3ubuntu1.1 |
devel | released | 3.22.0-6ubuntu1 |
esm-apps/jammy | released | 3.22.0-6ubuntu1 |
esm-apps/noble | released | 3.22.0-6ubuntu1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 3.22.0-3ubuntu1.1 |
esm-infra/focal | not-affected | 3.22.0-5ubuntu2.1 |
esm-infra/xenial | not-affected | 3.8.1-0ubuntu9.3 |
focal | released | 3.22.0-5ubuntu2.1 |
groovy | released | 3.22.0-6ubuntu1 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c ...
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
EPSS
5 Medium
CVSS2