English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891617
Category:Debian Local Security Checks
Title:Debian LTS Advisory ([SECURITY] [DLA 1617-1] libvncserver security update)
Summary:Kaspersky Lab discovered several vulnerabilities in libvncserver, a C;library to implement VNC server/client functionalities.;;CVE-2018-6307;;a heap use-after-free vulnerability in the server code of the file;transfer extension, which can result in remote code execution. This;attack appears to be exploitable via network connectivity.;;CVE-2018-15127;;contains a heap out-of-bound write vulnerability in the server code;of the file transfer extension, which can result in remote code;execution. This attack appears to be exploitable via network;connectivity.;;CVE-2018-20019;;multiple heap out-of-bound write vulnerabilities in VNC client code,;which can result in remote code execution.;;CVE-2018-20020;;heap out-of-bound write vulnerability in a structure in VNC client;code, which can result in remote code execution.;;CVE-2018-20021;;CWE-835: Infinite Loop vulnerability in VNC client code. The;vulnerability could allow an attacker to consume an excessive amount;of resources, such as CPU and RAM.;;CVE-2018-20022;;CWE-665: Improper Initialization weaknesses in VNC client code,;which could allow an attacker to read stack memory and can be abused;for information disclosure. Combined with another vulnerability, it;can be used to leak stack memory layout and bypass ASLR.;;CVE-2018-20023;;Improper Initialization vulnerability in VNC Repeater client code,;which could allow an attacker to read stack memory and can be abused;for information disclosure. Combined with another vulnerability, it;can be used to leak stack memory layout and bypass ASLR.;;CVE-2018-20024;;a null pointer dereference in VNC client code, which can result in;DoS.
Description:Summary:
Kaspersky Lab discovered several vulnerabilities in libvncserver, a C
library to implement VNC server/client functionalities.

CVE-2018-6307

a heap use-after-free vulnerability in the server code of the file
transfer extension, which can result in remote code execution. This
attack appears to be exploitable via network connectivity.

CVE-2018-15127

contains a heap out-of-bound write vulnerability in the server code
of the file transfer extension, which can result in remote code
execution. This attack appears to be exploitable via network
connectivity.

CVE-2018-20019

multiple heap out-of-bound write vulnerabilities in VNC client code,
which can result in remote code execution.

CVE-2018-20020

heap out-of-bound write vulnerability in a structure in VNC client
code, which can result in remote code execution.

CVE-2018-20021

CWE-835: Infinite Loop vulnerability in VNC client code. The
vulnerability could allow an attacker to consume an excessive amount
of resources, such as CPU and RAM.

CVE-2018-20022

CWE-665: Improper Initialization weaknesses in VNC client code,
which could allow an attacker to read stack memory and can be abused
for information disclosure. Combined with another vulnerability, it
can be used to leak stack memory layout and bypass ASLR.

CVE-2018-20023

Improper Initialization vulnerability in VNC Repeater client code,
which could allow an attacker to read stack memory and can be abused
for information disclosure. Combined with another vulnerability, it
can be used to leak stack memory layout and bypass ASLR.

CVE-2018-20024

a null pointer dereference in VNC client code, which can result in
DoS.

Affected Software/OS:
libvncserver on Debian Linux

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
0.9.9+dfsg2-6.1+deb8u4.

We recommend that you upgrade your libvncserver packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-6307
https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/
CopyrightCopyright (c) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.