← Retour aux CVEs
CVE-2019-15695
HIGH7.2
Description
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
Details CVE
Score CVSS v3.17.2
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie12/26/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
opensuse:leaptigervnc:tigervnc
Faiblesses (CWE)
CWE-121CWE-754CWE-787
References
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html(vulnerability@kaspersky.com)
https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89(vulnerability@kaspersky.com)
https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1(vulnerability@kaspersky.com)
https://www.openwall.com/lists/oss-security/2019/12/20/2(vulnerability@kaspersky.com)
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2019/12/20/2(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.