Rapid7 Vulnerability & Exploit Database

RHSA-2014:1826: libvncserver security update

Back to Search

RHSA-2014:1826: libvncserver security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
09/30/2014
Created
07/25/2018
Added
11/13/2014
Modified
07/04/2017

Description

LibVNCServer is a library that allows for easy creation of VNC server orclient functionality.An integer overflow flaw, leading to a heap-based buffer overflow, wasfound in the way screen sizes were handled by LibVNCServer. A malicious VNCserver could use this flaw to cause a client to crash or, potentially,execute arbitrary code in the client. (CVE-2014-6051)A NULL pointer dereference flaw was found in LibVNCServer's framebuffersetup. A malicious VNC server could use this flaw to cause a VNC client tocrash. (CVE-2014-6052)A NULL pointer dereference flaw was found in the way LibVNCServer handledcertain ClientCutText message. A remote attacker could use this flaw tocrash the VNC server by sending a specially crafted ClientCutText messagefrom a VNC client. (CVE-2014-6053)A divide-by-zero flaw was found in the way LibVNCServer handled the scalingfactor when it was set to "0". A remote attacker could use this flaw tocrash the VNC server using a malicious VNC client. (CVE-2014-6054)Two stack-based buffer overflow flaws were found in the way LibVNCServerhandled file transfers. A remote attacker could use this flaw to crash theVNC server using a malicious VNC client. (CVE-2014-6055)Red Hat would like to thank oCERT for reporting these issues. oCERTacknowledges Nicolas Ruff as the original reporter.All libvncserver users are advised to upgrade to these updated packages,which contain backported patches to correct these issues. All runningapplications linked against libvncserver must be restarted for this updateto take effect.

Solution(s)

  • redhat-upgrade-libvncserver
  • redhat-upgrade-libvncserver-debuginfo
  • redhat-upgrade-libvncserver-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;