Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1144287 - (CVE-2014-6051) CVE-2014-6051 libvncserver: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling
CVE-2014-6051 libvncserver: integer overflow flaw, leading to a heap-based bu...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140923,repor...
: Security
Depends On: 1145878 1145879 1145880 1145883 1157668 1157669 1157670 1157671 1184538
Blocks: 1144297 1184533
  Show dependency treegraph
 
Reported: 2014-09-19 03:31 EDT by Murray McAllister
Modified: 2015-11-25 05:16 EST (History)
19 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way screen sizes were handled by LibVNCServer. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code in the client.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-11-11 17:33:29 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1826 normal SHIPPED_LIVE Moderate: libvncserver security update 2014-11-11 18:25:37 EST
Red Hat Product Errata RHSA-2015:0113 normal SHIPPED_LIVE Moderate: libvncserver security update 2015-02-02 19:13:42 EST

  None (edit)
Description Murray McAllister 2014-09-19 03:31:08 EDT
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way screen sizes were handled by LibVNCServer. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client.

Upstream commit:

https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
Comment 2 Murray McAllister 2014-09-24 00:19:26 EDT
Acknowledgements:

Red Hat would like to thank oCERT for reporting this issue. oCERT acknowledges Nicolas RUFF as the original reporter.
Comment 3 Murray McAllister 2014-09-24 00:20:53 EDT
Public now:

http://seclists.org/oss-sec/2014/q3/639
Comment 4 Murray McAllister 2014-09-24 00:29:11 EDT
Created libvncserver tracking bugs for this issue:

Affects: fedora-all [bug 1145878]
Affects: epel-5 [bug 1145879]
Affects: epel-7 [bug 1145880]
Comment 5 Murray McAllister 2014-09-24 00:48:25 EDT
Created krfb tracking bugs for this issue:

Affects: fedora-all [bug 1145883]
Comment 6 Murray McAllister 2014-09-24 00:50:55 EDT
krfb advisory:

http://www.kde.org/info/security/advisory-20140923-1.txt
Comment 9 Fedora Update System 2014-09-29 00:06:29 EDT
libvncserver-0.9.10-0.6.20140718git9453be42.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Fedora Update System 2014-10-01 00:23:24 EDT
libvncserver-0.9.10-0.6.20140718git9453be42.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 11 Fedora Update System 2014-10-03 23:24:59 EDT
libvncserver-0.9.10-0.6.20140718git9453be42.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 13 Fedora Update System 2014-10-08 15:11:22 EDT
krfb-4.11.5-4.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 14 Fedora Update System 2014-10-13 17:38:30 EDT
libvncserver-0.9.10-0.6.20140718git9453be42.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 17 Martin Prpič 2014-11-10 03:57:45 EST
IssueDescription:

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way screen sizes were handled by LibVNCServer. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code in the client.
Comment 18 errata-xmlrpc 2014-11-11 13:25:52 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2014:1826 https://rhn.redhat.com/errata/RHSA-2014-1826.html
Comment 20 errata-xmlrpc 2015-02-02 14:15:28 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 EUS - Server and Compute Node Only

Via RHSA-2015:0113 https://rhn.redhat.com/errata/RHSA-2015-0113.html

Note You need to log in before you can comment on or make changes to this bug.