First published: Thu Jan 09 2014(Updated: )
A heap-based buffer overflow was found in the way vncviewer rendered certain screen images from a vnc server. If a user could be tricked into connecting to a malicious vnc server, it may cause the vncviewer to crash, or could possibly execute arbitrary code with the permissions of the user running it.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tigervnc | <1.3.1 | 1.3.1 |
TigerVNC | <1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0011 is classified as a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2014-0011, upgrade to TigerVNC version 1.3.1 or later.
Users of TigerVNC versions prior to 1.3.1 are vulnerable to CVE-2014-0011.
CVE-2014-0011 allows an attacker to execute arbitrary code or crash the vncviewer by tricking the user into connecting to a malicious VNC server.
Yes, CVE-2014-0011 can be exploited remotely if a user connects to a compromised VNC server.