LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code, which can result in remote code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in a83439b9fbe0f03c48eb94ed05729cb016f8b72f and later. External Reference: https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/ Upstream Patch: https://github.com/LibVNC/libvncserver/commit/a83439b9fbe0f03c48eb94ed05729cb016f8b72f
Created libvncserver tracking bugs for this issue: Affects: epel-7 [bug 1661116] Affects: fedora-all [bug 1661115]
Upstream Issue: https://github.com/LibVNC/libvncserver/issues/247
Upstream patch is most likely problematic, for the same reasons as given in https://github.com/LibVNC/libvncserver/issues/273