An issue was discovered in vcSetXCutTextProc() in VNConsole.c in LinuxVNC and VNCommand from the LibVNC/vncterm distribution through 0.9.10. Missing sanitization of the client-specified message length may cause integer overflow or possibly have unspecified other impact via a specially crafted VNC packet. References: https://github.com/LibVNC/vncterm/issues/6 http://openwall.com/lists/oss-security/2018/02/18/2
Created libvncserver tracking bugs for this issue: Affects: epel-7 [bug 1549173] Affects: fedora-all [bug 1549174]
vncterm is not shipped as part of our RHEL6/7 packages.
Statement: This issue did not affect the versions of libvncserver as shipped with Red Hat Enterprise Linux 6 and 7.