LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1977-1 | libvncserver security update |
Debian DLA |
DLA-1979-1 | italc security update |
Debian DLA |
DLA-2014-1 | vino security update |
Debian DLA |
DLA-2045-1 | tightvnc security update |
EUVD |
EUVD-2019-6620 | LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a. |
Ubuntu USN |
USN-4407-1 | LibVNCServer vulnerabilities |
Ubuntu USN |
USN-4547-1 | iTALC vulnerabilities |
Ubuntu USN |
USN-4573-1 | Vino vulnerabilities |
Ubuntu USN |
USN-4587-1 | iTALC vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Kaspersky
Published:
Updated: 2024-08-05T00:56:22.452Z
Reserved: 2019-08-27T00:00:00
Link: CVE-2019-15681
No data.
Status : Modified
Published: 2019-10-29T19:15:18.127
Modified: 2024-11-21T04:29:15.050
Link: CVE-2019-15681
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN