First published: Sat Apr 01 2017(Updated: )
In TigerVNC (SMsgReader.cxx SMsgReader::readClientCutText), an authenticated client can crash the server by causing an integer overflow. Upstream patch: <a href="https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689">https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TigerVNC | =1.7.1 |
https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7395 is categorized as a vulnerability that can allow an authenticated client to crash the TigerVNC server.
To fix CVE-2017-7395, users should update TigerVNC to version 1.7.2 or later, which includes the necessary patches.
CVE-2017-7395 affects TigerVNC version 1.7.1.
CVE-2017-7395 requires an authenticated client, meaning exploitation can occur only from users with access to the server.
The main consequence of CVE-2017-7395 is a denial of service, as it allows an authenticated client to crash the TigerVNC server.