Package: libvncserver X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerabilities were published for libvncserver. CVE-2018-15126[0]: | LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains | heap use-after-free vulnerability in server code of file transfer | extension that can result remote code execution CVE-2018-15127[1]: | LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains | heap out-of-bound write vulnerability in server code of file transfer | extension that can result remote code execution CVE-2018-20019[2]: | LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains | multiple heap out-of-bound write vulnerabilities in VNC client code | that can result remote code execution CVE-2018-20020[3]: | LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains | heap out-of-bound write vulnerability inside structure in VNC client | code that can result remote code execution CVE-2018-20021[4]: | LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains | a CWE-835: Infinite loop vulnerability in VNC client code. | Vulnerability allows attacker to consume excessive amount of resources | like CPU and RAM CVE-2018-20022[5]: | LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains | multiple weaknesses CWE-665: Improper Initialization vulnerability in | VNC client code that allows attacker to read stack memory and can be | abuse for information disclosure. Combined with another vulnerability, | it can be used to leak stack memory layout and in bypassing ASLR CVE-2018-20023[6]: | LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains | CWE-665: Improper Initialization vulnerability in VNC Repeater client | code that allows attacker to read stack memory and can be abuse for | information disclosure. Combined with another vulnerability, it can be | used to leak stack memory layout and in bypassing ASLR CVE-2018-20024[7]: | LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains | null pointer dereference in VNC client code that can result DoS. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-15126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126 [1] https://security-tracker.debian.org/tracker/CVE-2018-15127 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127 [2] https://security-tracker.debian.org/tracker/CVE-2018-20019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019 [3] https://security-tracker.debian.org/tracker/CVE-2018-20020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020 [4] https://security-tracker.debian.org/tracker/CVE-2018-20021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021 [5] https://security-tracker.debian.org/tracker/CVE-2018-20022 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022 [6] https://security-tracker.debian.org/tracker/CVE-2018-20023 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023 [7] https://security-tracker.debian.org/tracker/CVE-2018-20024 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024 Please adjust the affected versions in the BTS as needed. Regards, Markus
signature.asc
Description: OpenPGP digital signature