aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2020/dla-2347.wml
blob: 425750f74e65c2a2a13b326058ca8a6f94bab985 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Several minor vulnerabilities have been discovered in libvncserver, a
server and client implementation of the VNC protocol.</p>

<ul>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20839">CVE-2019-20839</a>

    <p>libvncclient/sockets.c in LibVNCServer had a buffer overflow via a
    long socket filename.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14397">CVE-2020-14397</a>

    <p>libvncserver/rfbregion.c has a NULL pointer dereference.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14399">CVE-2020-14399</a>

    <p>Byte-aligned data was accessed through uint32_t pointers in
    libvncclient/rfbproto.c.</p>

    <p>NOTE: This issue has been disputed by third parties; there is
    reportedly <q>no trust boundary crossed</q>.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14400">CVE-2020-14400</a>

    <p>Byte-aligned data was accessed through uint16_t pointers in
    libvncserver/translate.c.</p>

    <p>NOTE: This issue has been disputed by third parties. There is no
    known path of exploitation or cross of a trust boundary.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14401">CVE-2020-14401</a>

    <p>libvncserver/scale.c had a pixel_value integer overflow.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14402">CVE-2020-14402</a>

    <p>libvncserver/corre.c allowed out-of-bounds access via encodings.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14403">CVE-2020-14403</a>

    <p>libvncserver/hextile.c allowed out-of-bounds access via encodings.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14404">CVE-2020-14404</a>

    <p>libvncserver/rre.c allowed out-of-bounds access via encodings.</p></li>

<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14405">CVE-2020-14405</a>

    <p>libvncclient/rfbproto.c did not limit TextChat size.</p></li>

</ul>

<p>For Debian 9 stretch, these problems have been fixed in version
0.9.11+dfsg-1.3~deb9u5.</p>

<p>We recommend that you upgrade your libvncserver packages.</p>

<p>For the detailed security status of libvncserver please refer to
its security tracker page at:
<a href="https://security-tracker.debian.org/tracker/libvncserver">https://security-tracker.debian.org/tracker/libvncserver</a></p>

<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2020/dla-2347.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy