An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
www.openwall.com/lists/oss-security/2018/02/18/1
www.securityfocus.com/bid/103107
access.redhat.com/errata/RHSA-2018:1055
github.com/LibVNC/libvncserver/issues/218
lists.debian.org/debian-lts-announce/2018/03/msg00035.html
lists.debian.org/debian-lts-announce/2019/10/msg00042.html
lists.debian.org/debian-lts-announce/2019/11/msg00032.html
lists.debian.org/debian-lts-announce/2019/12/msg00028.html
security.gentoo.org/glsa/201908-05
usn.ubuntu.com/3618-1/
usn.ubuntu.com/4547-1/
usn.ubuntu.com/4573-1/
usn.ubuntu.com/4587-1/
www.debian.org/security/2018/dsa-4221