First published: Fri Sep 19 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Debian Debian Linux | =7.0 | |
Redhat Enterprise Linux Server Aus | =6.5 | |
Redhat Enterprise Linux Server Eus | =6.5.z | |
Libvncserver Libvncserver | <=0.9.9 | |
debian/libvncserver | 0.9.13+dfsg-2+deb11u1 0.9.14+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2014-6055.
The severity level of CVE-2014-6055 is medium, with a severity value of 6.5.
CVE-2014-6055 affects LibVNCServer 0.9.9 and earlier, Fedora 20 and 21, Debian Linux 7.0, Red Hat Enterprise Linux Server Aus 6.5, Red Hat Enterprise Linux Server Eus 6.5.z, and Ubuntu packages krfb and libvncserver.
A remote authenticated user can exploit CVE-2014-6055 by causing a denial of service (crash) and possibly executing arbitrary code via a long file or directory name or the FileTime attribute in a rfbserver.c file.
You can find more information about CVE-2014-6055 at the following references: [link1](http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html), [link2](http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html), [link3](http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html).