Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.844666
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-4587-1)
Summary:The remote host is missing an update for the 'italc' package(s) announced via the USN-4587-1 advisory.
Description:Summary:
The remote host is missing an update for the 'italc' package(s) announced via the USN-4587-1 advisory.

Vulnerability Insight:
Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors
and didn't check malloc return values. A remote attacker could use these issues
to cause a denial of service or possibly execute arbitrary code.
(CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055)

Josef Gajdusek discovered that iTALC had heap-based buffer overflow
vulnerabilities. A remote attacker could used these issues to cause a denial of
service or possibly execute arbitrary code. (CVE-2016-9941, CVE-2016-9942)

It was discovered that iTALC had an out-of-bounds write, multiple heap
out-of-bounds writes, an infinite loop, improper initializations, and null
pointer vulnerabilities. A remote attacker could used these issues to cause a
denial of service or possibly execute arbitrary code. (CVE-2018-15127,
CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023,
CVE-2018-20024, CVE-2018-20748, CVE-2018-20749, CVE-2018-20750, CVE-2018-7225,
CVE-2019-15681)

Affected Software/OS:
'italc' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-6051
BugTraq ID: 70093
http://www.securityfocus.com/bid/70093
Debian Security Information: DSA-3081 (Google Search)
http://www.debian.org/security/2014/dsa-3081
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
https://security.gentoo.org/glsa/201507-07
https://security.gentoo.org/glsa/201612-36
http://www.ocert.org/advisories/ocert-2014-007.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
http://seclists.org/oss-sec/2014/q3/639
http://www.openwall.com/lists/oss-security/2014/09/25/11
RedHat Security Advisories: RHSA-2015:0113
http://rhn.redhat.com/errata/RHSA-2015-0113.html
http://secunia.com/advisories/61506
SuSE Security Announcement: openSUSE-SU-2015:2207 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
https://usn.ubuntu.com/4587-1/
Common Vulnerability Exposure (CVE) ID: CVE-2014-6052
BugTraq ID: 70091
http://www.securityfocus.com/bid/70091
http://secunia.com/advisories/61682
http://ubuntu.com/usn/usn-2365-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-6053
https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
https://usn.ubuntu.com/4573-1/
Common Vulnerability Exposure (CVE) ID: CVE-2014-6054
BugTraq ID: 70094
http://www.securityfocus.com/bid/70094
http://www.ubuntu.com/usn/USN-2365-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-6055
BugTraq ID: 70096
http://www.securityfocus.com/bid/70096
XForce ISS Database: libvncserver-cve20146055-bo(96187)
https://exchange.xforce.ibmcloud.com/vulnerabilities/96187
Common Vulnerability Exposure (CVE) ID: CVE-2016-9941
BugTraq ID: 95170
http://www.securityfocus.com/bid/95170
Debian Security Information: DSA-3753 (Google Search)
http://www.debian.org/security/2017/dsa-3753
https://security.gentoo.org/glsa/201702-24
Common Vulnerability Exposure (CVE) ID: CVE-2016-9942
Common Vulnerability Exposure (CVE) ID: CVE-2018-15127
Debian Security Information: DSA-4383 (Google Search)
https://www.debian.org/security/2019/dsa-4383
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/
https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html
RedHat Security Advisories: RHSA-2019:0059
https://access.redhat.com/errata/RHSA-2019:0059
https://usn.ubuntu.com/3877-1/
https://usn.ubuntu.com/4547-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20019
https://security.gentoo.org/glsa/201908-05
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20020
https://security.gentoo.org/glsa/202006-06
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/
https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html
https://usn.ubuntu.com/4547-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20021
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20022
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20023
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20024
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20748
https://github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae
https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7
https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a
https://github.com/LibVNC/libvncserver/commit/e34bcbb759ca5bef85809967a268fdf214c1ad2c
https://github.com/LibVNC/libvncserver/issues/273
https://www.openwall.com/lists/oss-security/2018/12/10/8
https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-20749
BugTraq ID: 106825
http://www.securityfocus.com/bid/106825
https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707
Common Vulnerability Exposure (CVE) ID: CVE-2018-20750
https://github.com/LibVNC/libvncserver/commit/09e8fc02f59f16e2583b34fe1a270c238bd9ffec
Common Vulnerability Exposure (CVE) ID: CVE-2018-7225
BugTraq ID: 103107
http://www.securityfocus.com/bid/103107
Debian Security Information: DSA-4221 (Google Search)
https://www.debian.org/security/2018/dsa-4221
http://www.openwall.com/lists/oss-security/2018/02/18/1
https://github.com/LibVNC/libvncserver/issues/218
https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html
RedHat Security Advisories: RHSA-2018:1055
https://access.redhat.com/errata/RHSA-2018:1055
https://usn.ubuntu.com/3618-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-15681
https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a
https://lists.debian.org/debian-lts-announce/2019/10/msg00039.html
SuSE Security Announcement: openSUSE-SU-2020:0624 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html
SuSE Security Announcement: openSUSE-SU-2020:1071 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html
https://usn.ubuntu.com/4407-1/
CopyrightCopyright (C) 2020 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.