Search CVE reports
1 – 7 of 7 results
CVE-2019-15680
Low prioritySome fixes available 5 of 75
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
6 affected packages
libvncserver, ssvnc, tightvnc, veyon, vncsnapshot, x11vnc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libvncserver | Not affected | Not affected | Fixed | Fixed | Fixed |
ssvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
tightvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
veyon | Needs evaluation | Needs evaluation | Needs evaluation | Not in release | Not in release |
vncsnapshot | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x11vnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-15679
Medium prioritySome fixes available 1 of 84
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
7 affected packages
libvncserver, ssvnc, tightvnc, veyon, vncsnapshot...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libvncserver | Not affected | Not affected | Not affected | Not affected | Not affected |
ssvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
tightvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
veyon | Needs evaluation | Needs evaluation | Needs evaluation | Not in release | Not in release |
vncsnapshot | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x11vnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x2vnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2019-15678
Medium prioritySome fixes available 1 of 126
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
11 affected packages
bochs, directvnc, libvncserver, ssvnc, tightvnc...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
bochs | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
directvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
libvncserver | Not affected | Not affected | Not affected | Not affected | Not affected |
ssvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
tightvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
veyon | Needs evaluation | Needs evaluation | Needs evaluation | Not in release | Not in release |
vino | Not affected | Not affected | Not affected | Not affected | Not affected |
vlc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
vncsnapshot | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x11vnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x2vnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2018-20024
Medium prioritySome fixes available 7 of 9
LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.
4 affected packages
italc, libvncserver, ssvnc, x11vnc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
italc | Not in release | Not in release | Not in release | Fixed | Fixed |
libvncserver | Not affected | Not affected | Not affected | Fixed | Fixed |
ssvnc | Not affected | Not affected | Not affected | Vulnerable | Fixed |
x11vnc | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2018-20022
Medium prioritySome fixes available 8 of 22
LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information...
5 affected packages
italc, libvncserver, ssvnc, tightvnc, x11vnc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
italc | Not in release | Not in release | Not in release | Fixed | Fixed |
libvncserver | Not affected | Not affected | Not affected | Fixed | Fixed |
ssvnc | Not affected | Not affected | Not affected | Vulnerable | Fixed |
tightvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x11vnc | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2018-20021
Medium prioritySome fixes available 8 of 22
LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
5 affected packages
italc, libvncserver, ssvnc, tightvnc, x11vnc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
italc | Not in release | Not in release | Not in release | Fixed | Fixed |
libvncserver | Not affected | Not affected | Not affected | Fixed | Fixed |
ssvnc | Not affected | Not affected | Not affected | Vulnerable | Fixed |
tightvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x11vnc | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2018-20020
Medium prioritySome fixes available 8 of 22
LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution
5 affected packages
italc, libvncserver, ssvnc, tightvnc, x11vnc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
italc | Not in release | Not in release | Not in release | Fixed | Fixed |
libvncserver | Not affected | Not affected | Not affected | Fixed | Fixed |
ssvnc | Not affected | Not affected | Not affected | Vulnerable | Fixed |
tightvnc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
x11vnc | Not affected | Not affected | Not affected | Not affected | Not affected |