Bug 1790318 (CVE-2019-15695) - CVE-2019-15695 tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
Summary: CVE-2019-15695 tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
Keywords:
Status: NEW
Alias: CVE-2019-15695
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1791772 1791773 1791774
Blocks: 1790319
TreeView+ depends on / blocked
 
Reported: 2020-01-13 06:17 UTC by Pedro Sampaio
Modified: 2020-01-16 12:57 UTC (History)
4 users (show)

Fixed In Version: tigervnc 1.10.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Pedro Sampaio 2020-01-13 06:17:09 UTC
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.

Upstream patch:

https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89

References:

https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1
https://www.openwall.com/lists/oss-security/2019/12/20/2


Note You need to log in before you can comment on or make changes to this bug.