First published: Wed Dec 19 2018(Updated: )
LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains a heap out-of-bound write vulnerability in the server code of the file transfer extension, which can result in remote code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in 502821828ed00b4a2c4bef90683d0fd88ce495de and later. External Reference: <a href="https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/">https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/</a> Upstream Patch: <a href="https://github.com/LibVNC/libvncserver/commit/502821828ed00b4a2c4bef90683d0fd88ce495de">https://github.com/LibVNC/libvncserver/commit/502821828ed00b4a2c4bef90683d0fd88ce495de</a>
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
<0.9.12 | ||
=14.04 | ||
=16.04 | ||
=18.04 | ||
=18.10 | ||
=7.0 | ||
=7.0 | ||
=7.6 | ||
=7.6 | ||
=7.6 | ||
=7.0 | ||
=8.0 | ||
=9.0 | ||
Libvnc Project Libvncserver | <0.9.12 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/libvncserver | 0.9.11+dfsg-1.3+deb10u4 0.9.11+dfsg-1.3+deb10u5 0.9.13+dfsg-2+deb11u1 0.9.14+dfsg-1 | |
ubuntu/libvncserver | <0.9.11+dfsg-1ubuntu1.1 | 0.9.11+dfsg-1ubuntu1.1 |
ubuntu/libvncserver | <0.9.11+dfsg-1.1ubuntu0.1 | 0.9.11+dfsg-1.1ubuntu0.1 |
ubuntu/libvncserver | <0.9.9+dfsg-1ubuntu1.4 | 0.9.9+dfsg-1ubuntu1.4 |
ubuntu/libvncserver | <0.9.11+dfsg-1.2 | 0.9.11+dfsg-1.2 |
ubuntu/libvncserver | <0.9.10+dfsg-3ubuntu0.16.04.3 | 0.9.10+dfsg-3ubuntu0.16.04.3 |
ubuntu/italc | <1:3.0.3+dfsg1-3ubuntu0.1 | 1:3.0.3+dfsg1-3ubuntu0.1 |
ubuntu/italc | <1:3.0.3+dfsg1-1+<1:2.0.2+dfsg1-2+ | 1:3.0.3+dfsg1-1+ 1:2.0.2+dfsg1-2+ |
ubuntu/italc | <1:2.0.2+dfsg1-4ubuntu0.1 | 1:2.0.2+dfsg1-4ubuntu0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-15127 is critical with a severity value of 9.8.
CVE-2018-15127 is a heap out-of-bound write vulnerability in the server code of the file transfer extension in LibVNC, which can result in remote code execution.
The affected software versions are LibVNC 0.9.11+dfsg-1ubuntu1.1, 0.9.11+dfsg-1.1ubuntu0.1, 0.9.9+dfsg-1ubuntu1.4, 0.9.11+dfsg-1.2, 0.9.10+dfsg-3ubuntu0.16.04.3, and more.
To fix CVE-2018-15127, update the LibVNC package to version 0.9.11+dfsg-1ubuntu1.1 or apply the appropriate remedy provided by your OS vendor.
You can find more information about CVE-2018-15127 on the following references: [link1], [link2], [link3].