[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2347-1] libvncserver security update



-------------------------------------------------------------------------
Debian LTS Advisory DLA-2347-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Mike Gabriel
August 28, 2020                               https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : libvncserver
Version        : 0.9.11+dfsg-1.3~deb9u5
CVE ID         : CVE-2019-20839 CVE-2020-14397 CVE-2020-14399 CVE-2020-14400 
                 CVE-2020-14401 CVE-2020-14402 CVE-2020-14403 CVE-2020-14404 
                 CVE-2020-14405

Several minor vulnerabilities have been discovered in libvncserver, a
server and client implementation of the VNC protocol.

CVE-2019-20839

    libvncclient/sockets.c in LibVNCServer had a buffer overflow via a
    long socket filename.

CVE-2020-14397

    libvncserver/rfbregion.c has a NULL pointer dereference.

CVE-2020-14399

    Byte-aligned data was accessed through uint32_t pointers in
    libvncclient/rfbproto.c.

    NOTE: This issue has been disputed by third parties; there is
    reportedly "no trust boundary crossed".

CVE-2020-14400

    Byte-aligned data was accessed through uint16_t pointers in
    libvncserver/translate.c.

    NOTE: This issue has been disputed by third parties. There is no
    known path of exploitation or cross of a trust boundary.

CVE-2020-14401

    libvncserver/scale.c had a pixel_value integer overflow.

CVE-2020-14402

    libvncserver/corre.c allowed out-of-bounds access via encodings.

CVE-2020-14403

    libvncserver/hextile.c allowed out-of-bounds access via encodings.

CVE-2020-14404

    libvncserver/rre.c allowed out-of-bounds access via encodings.

CVE-2020-14405

    libvncclient/rfbproto.c did not limit TextChat size.

For Debian 9 stretch, these problems have been fixed in version
0.9.11+dfsg-1.3~deb9u5.

We recommend that you upgrade your libvncserver packages.

For the detailed security status of libvncserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libvncserver

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunweaver@debian.org, http://sunweavers.net

Attachment: signature.asc
Description: PGP signature


Reply to: