[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2017-879 ---- tigervnc

ID: oval:org.secpod.oval:def:1600764Date: (C)2017-09-21   (M)2023-04-17
Class: PATCHFamily: unix




Buffer overflow in ModifiablePixelBuffer::fillRectA buffer overflow flaw, leading to memory corruption, was found in TigerVNC viewer. A remote malicious VNC server could use this flaw to crash the client vncviewer process resulting in denial of service. VNC server can crash when TLS handshake terminates early:A denial of service flaw was found in the TigerVNC's Xvnc server. A remote unauthenticated attacker could use this flaw to make Xvnc crash by terminating the TLS handshake process early. SSecurityVeNCrypt memory leak:A memory leak flaw was found in the way TigerVNC handled termination of VeNCrypt connections. A remote unauthenticated attacker could repeatedly send connection requests to the Xvnc server, causing it to consume large amounts of memory resources over time, and ultimately leading to a denial of service due to memory exhaustion. Double free via crafted fences:A double free flaw was found in the way TigerVNC handled ClientFence messages. A remote, authenticated attacker could use this flaw to make Xvnc crash by sending specially crafted ClientFence messages, resulting in denial of service. Server crash via long usernames:A missing input sanitization flaw was found in the way TigerVNC handled credentials. A remote unauthenticated attacker could use this flaw to make Xvnc crash by sending specially crafted usernames, resulting in denial of service. Integer overflow in SMsgReader::readClientCutText:An integer overflow flaw was found in the way TigerVNC handled ClientCutText messages. A remote, authenticated attacker could use this flaw to make Xvnc crash by sending specially crafted ClientCutText messages, resulting in denial of service. SecurityServer and ClientServer memory leaks:A memory leak flaw was found in the way TigerVNC handled client connections. A remote unauthenticated attacker could repeatedly send connection requests to the Xvnc server, causing it to consume large amounts of memory resources over time, and ultimately leading to a denial of service due to memory exhaustion

Platform:
Amazon Linux AMI
Product:
tigervnc
Reference:
ALAS-2017-879
CVE-2017-5581
CVE-2016-10207
CVE-2017-7392
CVE-2017-7393
CVE-2017-7394
CVE-2017-7395
CVE-2017-7396
CVE    7
CVE-2016-10207
CVE-2017-5581
CVE-2017-7392
CVE-2017-7396
...
CPE    6
cpe:/o:amazon:linux
cpe:/a:tigervnc:tigervnc
cpe:/a:tigervnc:tigervnc:1.0.1
cpe:/a:tigervnc:tigervnc:1.1.0
...

© SecPod Technologies