CVE-2019-15692
Summary
| CVE | CVE-2019-15692 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-12-26 15:15:00 UTC |
| Updated | 2022-12-22 20:22:00 UTC |
| Description | TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Restrict PixelBuffer dimensions to safe values · CendioOssman/tigervnc@996356b · GitHub | MISC | github.com | Patch, Third Party Advisory |
| [security-announce] openSUSE-SU-2020:0087-1: important: Security update | SUSE | lists.opensuse.org | |
| Release TigerVNC 1.10.1 · TigerVNC/tigervnc · GitHub | MISC | github.com | Release Notes, Third Party Advisory |
| oss-security - VNC vulnerabilities. TigerVNC security update | MLIST | www.openwall.com | Exploit, Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.