LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains a heap use-after-free vulnerability in the server code of the file transfer extension, which can result in remote code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in 73cb96fec028a576a5a24417b57723b55854ad7b and later. External Reference: https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/ Upstream Patch: https://github.com/LibVNC/libvncserver/commit/73cb96fec028a576a5a24417b57723b55854ad7b
Created libvncserver tracking bugs for this issue: Affects: epel-7 [bug 1661112] Affects: fedora-all [bug 1661111]
Upstream Issue: https://github.com/LibVNC/libvncserver/issues/242
Reference: https://seclists.org/oss-sec/2018/q4/212
Statement: This issue did not affect the versions of libvncserver as shipped with Red Hat Enterprise Linux 6 and 7, as they did not include support for tightvnc file transfer.