An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1332-1 | libvncserver security update |
Debian DLA |
DLA-1979-1 | italc security update |
Debian DLA |
DLA-2014-1 | vino security update |
Debian DLA |
DLA-2045-1 | tightvnc security update |
Debian DSA |
DSA-4221-1 | libvncserver security update |
EUVD |
EUVD-2018-18964 | An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets. |
Ubuntu USN |
USN-3618-1 | LibVNCServer vulnerability |
Ubuntu USN |
USN-4547-1 | iTALC vulnerabilities |
Ubuntu USN |
USN-4573-1 | Vino vulnerabilities |
Ubuntu USN |
USN-4587-1 | iTALC vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T06:24:11.789Z
Reserved: 2018-02-19T00:00:00
Link: CVE-2018-7225
No data.
Status : Modified
Published: 2018-02-19T15:29:00.253
Modified: 2024-11-21T04:11:49.250
Link: CVE-2018-7225
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN