First published: Sat Dec 31 2016(Updated: )
Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libvncserver Project Libvncserver | =0.9.10 | |
debian/libvncserver | 0.9.13+dfsg-2+deb11u1 0.9.14+dfsg-1 | |
debian/veyon | 4.5.3+repack1-1 4.7.5+repack1-1 4.7.5+repack1-1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9942 is a heap-based buffer overflow vulnerability in LibVNCServer that allows remote servers to cause a denial of service or execute arbitrary code.
CVE-2016-9942 affects LibVNCClient in LibVNCServer versions before 0.9.11.
CVE-2016-9942 has a severity rating of 9.8 (Critical).
To fix CVE-2016-9942, update to LibVNCServer version 0.9.11 or later.
More information about CVE-2016-9942 can be found at the following references: [link1](https://github.com/LibVNC/libvncserver/pull/137), [link2](https://github.com/LibVNC/libvncserver/pull/137/commits/5fff4353f66427b467eb29e5fdc1da4f2be028bb), [link3](https://security-tracker.debian.org/tracker/CVE-2016-9942).