LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1977-1 libvncserver security update
Debian DLA Debian DLA DLA-1979-1 italc security update
Debian DLA Debian DLA DLA-2014-1 vino security update
Debian DLA Debian DLA DLA-2045-1 tightvnc security update
EUVD EUVD EUVD-2019-6620 LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
Ubuntu USN Ubuntu USN USN-4407-1 LibVNCServer vulnerabilities
Ubuntu USN Ubuntu USN USN-4547-1 iTALC vulnerabilities
Ubuntu USN Ubuntu USN USN-4573-1 Vino vulnerabilities
Ubuntu USN Ubuntu USN USN-4587-1 iTALC vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Kaspersky

Published:

Updated: 2024-08-05T00:56:22.452Z

Reserved: 2019-08-27T00:00:00

Link: CVE-2019-15681

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-29T19:15:18.127

Modified: 2024-11-21T04:29:15.050

Link: CVE-2019-15681

cve-icon Redhat

Severity : Low

Publid Date: 2019-10-30T00:00:00Z

Links: CVE-2019-15681 - Bugzilla

cve-icon OpenCVE Enrichment

No data.