The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-197-1 libvncserver security update
Debian DLA Debian DLA DLA-1979-1 italc security update
Debian DLA Debian DLA DLA-2014-1 vino security update
Debian DLA Debian DLA DLA-2045-1 tightvnc security update
Debian DSA Debian DSA DSA-3081-1 libvncserver security update
Ubuntu USN Ubuntu USN USN-2365-1 LibVNCServer vulnerabilities
Ubuntu USN Ubuntu USN USN-4573-1 Vino vulnerabilities
Ubuntu USN Ubuntu USN USN-4587-1 iTALC vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.40511}

epss

{'score': 0.36865}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T12:03:02.350Z

Reserved: 2014-09-01T00:00:00

Link: CVE-2014-6053

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-12-15T18:59:05.643

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-6053

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-09-23T00:00:00Z

Links: CVE-2014-6053 - Bugzilla

cve-icon OpenCVE Enrichment

No data.