Impact
LibVNCServer versions 0.9.15 and earlier contain a null pointer dereference flaw in the HTTP proxy handlers in httpProcessInput() of httpd.c. The issue is caused by missing validation of the return value from strchr() in the CONNECT and GET proxy paths, allowing an attacker to send a crafted HTTP request that triggers a crash of the VNC server. This results in a loss of availability of the service without exposing data or enabling code execution.
Affected Systems
The vulnerability affects all releases of LibVNCServer up to and including 0.9.15 when the HTTP daemon and proxy features are enabled. The bug is fixed in commit dc78dee of the LibVNCServer repository.
Risk and Exploitability
The CVSS score of 6.3 indicates medium severity, and the EPSS score is below 1%, suggesting a low likelihood of exploitation. The issue is not listed in CISA’s catalog of known exploited vulnerabilities. Attackers can exploit the flaw remotely by sending specially crafted HTTP requests without authentication, leading to a denial of service when the server receives those requests.
OpenCVE Enrichment