Package: libvncserver
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for libvncserver.

CVE-2018-15126[0]:
| LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains
| heap use-after-free vulnerability in server code of file transfer
| extension that can result remote code execution

CVE-2018-15127[1]:
| LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains
| heap out-of-bound write vulnerability in server code of file transfer
| extension that can result remote code execution

CVE-2018-20019[2]:
| LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains
| multiple heap out-of-bound write vulnerabilities in VNC client code
| that can result remote code execution

CVE-2018-20020[3]:
| LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains
| heap out-of-bound write vulnerability inside structure in VNC client
| code that can result remote code execution

CVE-2018-20021[4]:
| LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains
| a CWE-835: Infinite loop vulnerability in VNC client code.
| Vulnerability allows attacker to consume excessive amount of resources
| like CPU and RAM

CVE-2018-20022[5]:
| LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains
| multiple weaknesses CWE-665: Improper Initialization vulnerability in
| VNC client code that allows attacker to read stack memory and can be
| abuse for information disclosure. Combined with another vulnerability,
| it can be used to leak stack memory layout and in bypassing ASLR

CVE-2018-20023[6]:
| LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains
| CWE-665: Improper Initialization vulnerability in VNC Repeater client
| code that allows attacker to read stack memory and can be abuse for
| information disclosure. Combined with another vulnerability, it can be
| used to leak stack memory layout and in bypassing ASLR

CVE-2018-20024[7]:
| LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains
| null pointer dereference in VNC client code that can result DoS.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-15126
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126
[1] https://security-tracker.debian.org/tracker/CVE-2018-15127
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
[2] https://security-tracker.debian.org/tracker/CVE-2018-20019
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019
[3] https://security-tracker.debian.org/tracker/CVE-2018-20020
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
[4] https://security-tracker.debian.org/tracker/CVE-2018-20021
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021
[5] https://security-tracker.debian.org/tracker/CVE-2018-20022
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022
[6] https://security-tracker.debian.org/tracker/CVE-2018-20023
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023
[7] https://security-tracker.debian.org/tracker/CVE-2018-20024
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024

Please adjust the affected versions in the BTS as needed.

Regards,

Markus

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to