Lucene search

K
mageiaGentoo FoundationMGASA-2020-0280
HistoryJul 05, 2020 - 10:48 p.m.

Updated libvncserver packages fix security vulnerability

2020-07-0522:48:23
Gentoo Foundation
advisories.mageia.org
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.013 Low

EPSS

Percentile

85.4%

Updated libvncserver packages fix security vulnerabilities: libvncclient/sockets.c in LibVNCServer had a buffer overflow via a long socket filename (CVE-2019-20839). libvncserver/rfbregion.c had a NULL pointer dereference (CVE-2020-14397). Byte-aligned data was accessed through uint32_t pointers in libvncclient/rfbproto.c (CVE-2020-14399). Byte-aligned data was accessed through uint16_t pointers in libvncserver/translate.c (CVE-2020-14400). libvncserver/scale.c had a pixel_value integer overflow (CVE-2020-14401). libvncserver/corre.c allowed out-of-bounds access via encodings (CVE-2020-14402). libvncserver/hextile.c allowed out-of-bounds access via encodings (CVE-2020-14403). libvncserver/rre.c allowed out-of-bounds access via encodings (CVE-2020-14404). libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405). The libvncserver package has been updated to version 0.9.13, fixing these issues and several others. See the release announcement for details.

OSVersionArchitecturePackageVersionFilename
Mageia7noarchlibvncserver< 0.9.13-1libvncserver-0.9.13-1.mga7

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.013 Low

EPSS

Percentile

85.4%