Metrics
Affected Vendors & Products
Solution
Update LibVNCServer to the commit with hash 54220248886b5001fbbb9fa73c4e1a2cb9413fed or newer.
Workaround
No workaround given by the vendor.
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 24 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 24 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in libvncserver. An integer overflow within the HandleCursorShape() function can be exploited to cause a heap-based buffer overflow by tricking a user or application using libvncserver to connect to an unstrusted server and subsequently send cursor shapes with specially crafted dimensions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution. |
References |
| |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: Kaspersky
Published:
Updated: 2025-01-24T18:22:55.433Z
Reserved: 2019-08-27T00:00:00.000Z
Link: CVE-2019-15690

Updated: 2025-01-24T18:22:51.425Z

Status : Received
Published: 2025-01-24T18:15:27.657
Modified: 2025-01-24T18:15:27.657
Link: CVE-2019-15690


No data.