** Changed in: tightvnc (Debian)
Status: Unknown => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1808989
Title:
tightvnc vulnerabilities
To manage notifications about this bug
** Bug watch added: Debian Bug tracker #945364
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945364
** Also affects: tightvnc (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945364
Importance: Unknown
Status: Unknown
--
You received this bug notification becaus
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1808989
Title:
tightvnc vulnerabilities
To manage notifications about this bug go to:
https:
In particular, following 4 issues are related to to tightvnc viewer:
```
1. global buffer overflow in corre.c
In `vnc_unixsrc/vncviewer/corre.c` inside the `HandleCoRREBPP` function
global buffer overflow occurs due to the lack of size check.
`buffer` is defined in rfbproto.c:96 as ```ch
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: tightvnc (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1808989
Title:
t