9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
libvncserver.so is vulnerable to denial of service (DoS) attacks. The vulnerability exists due to the lack of size validation of msg.cct.legnth
in the rfbProcessClientNormalMessage
function of libvncserver/rfbserver.c
, potentially causing a denial of service (DoS) attack.
www.openwall.com/lists/oss-security/2018/02/18/1
www.securityfocus.com/bid/103107
access.redhat.com/errata/RHSA-2018:1055
bugzilla.redhat.com/show_bug.cgi?id=1546858
github.com/LibVNC/libvncserver/issues/218
github.com/LibVNC/libvncserver/pull/221
github.com/ppisar/libvncserver/commit/0073e4f694d5a51bb72ff12a5e8364b6e752e094
lists.debian.org/debian-lts-announce/2018/03/msg00035.html
lists.debian.org/debian-lts-announce/2019/10/msg00042.html
lists.debian.org/debian-lts-announce/2019/11/msg00032.html
lists.debian.org/debian-lts-announce/2019/12/msg00028.html
security.gentoo.org/glsa/201908-05
usn.ubuntu.com/3618-1/
usn.ubuntu.com/4547-1/
usn.ubuntu.com/4573-1/
usn.ubuntu.com/4587-1/
www.debian.org/security/2018/dsa-4221
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P