Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891979
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-1979-1)
Summary:The remote host is missing an update for the Debian 'italc' package(s) announced via the DLA-1979-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'italc' package(s) announced via the DLA-1979-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been identified in the VNC code of iTALC, a classroom management software. All vulnerabilities referenced below are issues that have originally been reported against Debian source package libvncserver. The italc source package in Debian ships a custom-patched version of libvncserver, thus libvncserver's security fixes required porting over.

CVE-2014-6051

Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer allowed remote VNC servers to cause a denial of service (crash) and possibly executed arbitrary code via an advertisement for a large screen size, which triggered a heap-based buffer overflow.

CVE-2014-6052

The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer did not check certain malloc return values, which allowed remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.

CVE-2014-6053

The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer did not properly handle attempts to send a large amount of ClientCutText data, which allowed remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that was processed by using a single unchecked malloc.

CVE-2014-6054

The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer allowed remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.

CVE-2014-6055

Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer allowed remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.

CVE-2016-9941

Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServer allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area.

CVE-2016-9942

Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeded what is specified by the tile dimensions.

CVE-2018-6307

LibVNC contained heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.

CVE-2018-7225

An issue was discovered in LibVNCServer. rfbProcessClientNormalMessage() in ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'italc' package(s) on Debian 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-6051
BugTraq ID: 70093
http://www.securityfocus.com/bid/70093
Debian Security Information: DSA-3081 (Google Search)
http://www.debian.org/security/2014/dsa-3081
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
https://security.gentoo.org/glsa/201507-07
https://security.gentoo.org/glsa/201612-36
http://www.ocert.org/advisories/ocert-2014-007.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
http://seclists.org/oss-sec/2014/q3/639
http://www.openwall.com/lists/oss-security/2014/09/25/11
RedHat Security Advisories: RHSA-2015:0113
http://rhn.redhat.com/errata/RHSA-2015-0113.html
http://secunia.com/advisories/61506
SuSE Security Announcement: openSUSE-SU-2015:2207 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
https://usn.ubuntu.com/4587-1/
Common Vulnerability Exposure (CVE) ID: CVE-2014-6052
BugTraq ID: 70091
http://www.securityfocus.com/bid/70091
http://secunia.com/advisories/61682
http://ubuntu.com/usn/usn-2365-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-6053
https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
https://usn.ubuntu.com/4573-1/
Common Vulnerability Exposure (CVE) ID: CVE-2014-6054
BugTraq ID: 70094
http://www.securityfocus.com/bid/70094
http://www.ubuntu.com/usn/USN-2365-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-6055
BugTraq ID: 70096
http://www.securityfocus.com/bid/70096
XForce ISS Database: libvncserver-cve20146055-bo(96187)
https://exchange.xforce.ibmcloud.com/vulnerabilities/96187
Common Vulnerability Exposure (CVE) ID: CVE-2016-9941
BugTraq ID: 95170
http://www.securityfocus.com/bid/95170
Debian Security Information: DSA-3753 (Google Search)
http://www.debian.org/security/2017/dsa-3753
https://security.gentoo.org/glsa/201702-24
Common Vulnerability Exposure (CVE) ID: CVE-2016-9942
Common Vulnerability Exposure (CVE) ID: CVE-2018-15126
Debian Security Information: DSA-4383 (Google Search)
https://www.debian.org/security/2019/dsa-4383
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/
https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html
https://usn.ubuntu.com/3877-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-15127
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/
https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html
RedHat Security Advisories: RHSA-2019:0059
https://access.redhat.com/errata/RHSA-2019:0059
https://usn.ubuntu.com/4547-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20019
https://security.gentoo.org/glsa/201908-05
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20020
https://security.gentoo.org/glsa/202006-06
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/
https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html
https://usn.ubuntu.com/4547-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20021
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20022
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20023
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20024
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/
Common Vulnerability Exposure (CVE) ID: CVE-2018-20748
https://github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae
https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7
https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a
https://github.com/LibVNC/libvncserver/commit/e34bcbb759ca5bef85809967a268fdf214c1ad2c
https://github.com/LibVNC/libvncserver/issues/273
https://www.openwall.com/lists/oss-security/2018/12/10/8
Common Vulnerability Exposure (CVE) ID: CVE-2018-20749
BugTraq ID: 106825
http://www.securityfocus.com/bid/106825
https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707
Common Vulnerability Exposure (CVE) ID: CVE-2018-20750
https://github.com/LibVNC/libvncserver/commit/09e8fc02f59f16e2583b34fe1a270c238bd9ffec
Common Vulnerability Exposure (CVE) ID: CVE-2018-6307
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/
Common Vulnerability Exposure (CVE) ID: CVE-2018-7225
BugTraq ID: 103107
http://www.securityfocus.com/bid/103107
Debian Security Information: DSA-4221 (Google Search)
https://www.debian.org/security/2018/dsa-4221
http://www.openwall.com/lists/oss-security/2018/02/18/1
https://github.com/LibVNC/libvncserver/issues/218
https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html
RedHat Security Advisories: RHSA-2018:1055
https://access.redhat.com/errata/RHSA-2018:1055
https://usn.ubuntu.com/3618-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-15681
https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a
https://lists.debian.org/debian-lts-announce/2019/10/msg00039.html
SuSE Security Announcement: openSUSE-SU-2020:0624 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html
SuSE Security Announcement: openSUSE-SU-2020:1071 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html
https://usn.ubuntu.com/4407-1/
CopyrightCopyright (C) 2019 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.