TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/CendioOssman/tigervnc/commit/996356b6c65ca165ee1ea46a571c32a1dc3c3821 | third party advisory patch |
https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1 | third party advisory release notes |
https://www.openwall.com/lists/oss-security/2019/12/20/2 | mailing list third party advisory exploit |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html | vendor advisory mailing list third party advisory |