Description
LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.
Published: 2026-03-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure or Application Crash
Action: Apply Patch
AI Analysis

Impact

This vulnerability occurs when a VNC client processes an UltraZip encoded frame that contains a manipulated subrectangle header count. The HandleUltraZipBPP() function fails to enforce proper bounds on the heap buffer, allowing a remote VNC server to read memory beyond the allocated region. The resulting out‑of‑bounds read can expose sensitive data stored in RAM or cause the client application to crash, resulting in a denial of service.

Affected Systems

The issue affects LibVNCServer releases 0.9.15 and older. Any system that runs these versions of the library while accepting remote connections using the UltraZip encoding is potentially vulnerable. Updating to a version that includes the fix introduced in commit 009008e is required to remove the flaw.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, further indicating limited exploitation history. Attackers would need to control a VNC server that communicates with the vulnerable client; the attack vector is remote and network‑based. If the attacker can induce the vulnerable client to decode crafted UltraZip data, the out‑of‑bounds read occurs during normal operation without special privileges on the client machine.

Generated by OpenCVE AI on March 25, 2026 at 23:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update LibVNCServer to a version newer than 0.9.15 or apply the patch from commit 009008e.
  • If an immediate upgrade is not possible, disable the UltraZip encoding on the client or block VNC traffic from untrusted sources.
  • Regularly monitor the network for anomalous VNC traffic and verify that the client is not encountering crashes or abnormal memory disclosures.

Generated by OpenCVE AI on March 25, 2026 at 23:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Libvncserver Project
Libvncserver Project libvncserver
CPEs cpe:2.3:a:libvncserver_project:libvncserver:*:*:*:*:*:*:*:*
Vendors & Products Libvncserver Project
Libvncserver Project libvncserver
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}


Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Libvncserver
Libvncserver libvncserver
Vendors & Products Libvncserver
Libvncserver libvncserver

Wed, 25 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}

threat_severity

Moderate


Tue, 24 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.
Title LibVNCServer UltraZip Encoding Heap Out-of-bounds Read
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Libvncserver Libvncserver
Libvncserver Project Libvncserver
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-25T13:41:15.171Z

Reserved: 2026-03-16T18:11:41.759Z

Link: CVE-2026-32853

cve-icon Vulnrichment

Updated: 2026-03-25T13:41:06.842Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T18:16:09.253

Modified: 2026-03-25T20:48:30.733

Link: CVE-2026-32853

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-24T17:30:40Z

Links: CVE-2026-32853 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:19:42Z

Weaknesses