First published: Thu Feb 02 2017(Updated: )
A vulnerability was found in tigerVNC. The Xvnc server from tigervnc can crash when a client terminates a TLS connection early. This is due to invalid initialization/deinitialization order of the GnuTLS library. References: <a href="http://seclists.org/oss-sec/2017/q1/297">http://seclists.org/oss-sec/2017/q1/297</a> Upstream patch: <a href="https://github.com/TigerVNC/tigervnc/commit/8aa4bc53206c2430bbf0c8f4b642f59a379ee649">https://github.com/TigerVNC/tigervnc/commit/8aa4bc53206c2430bbf0c8f4b642f59a379ee649</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.1 | |
SUSE Linux | =42.2 | |
Tigervnc | =0.0.90 | |
Tigervnc | =0.0.91 | |
Tigervnc | =1.0 | |
Tigervnc | =1.0.1 | |
Tigervnc | =1.1.0 | |
Tigervnc | =1.3 | |
Tigervnc | =1.3.1 | |
Tigervnc | =1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10207 is classified as a medium severity vulnerability due to the potential for causing a crash.
CVE-2016-10207 affects TigerVNC by causing the Xvnc server to crash when a client terminates a TLS connection prematurely.
CVE-2016-10207 affects TigerVNC versions 0.0.90, 0.0.91, 1.0, 1.0.1, 1.1.0, 1.3, 1.3.1, and 1.7.
To fix CVE-2016-10207, upgrade to a patched version of TigerVNC that addresses the initialization order issue with GnuTLS.
If you are using openSUSE, you should upgrade your system packages to obtain the security updates that mitigate CVE-2016-10207.