First published: Wed Jun 17 2020(Updated: )
An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libvnc Project Libvncserver | <=0.9.12 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Siemens Simatic Itc1500 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1500 | ||
Siemens Simatic Itc1500 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1500 Pro | ||
Siemens Simatic Itc1900 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1900 | ||
Siemens Simatic Itc1900 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1900 Pro | ||
Siemens Simatic Itc2200 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc2200 | ||
Siemens Simatic Itc2200 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc2200 Pro | ||
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-21247.
The severity level of CVE-2018-21247 is high (7.5).
The affected software includes LibVNCServer versions up to and including 0.9.12, Canonical Ubuntu Linux 14.04, 16.04, and 18.04, Debian Debian Linux 8.0 and 9.0, and Siemens Simatic Itc1500/Itc1500 Pro/Itc1900/Itc1900 Pro/Itc2200/Itc2200 Pro firmware versions up to and including 3.2.1.0.
This vulnerability is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function of LibVNCServer before 0.9.13.
Yes, you can find references regarding CVE-2018-21247 at the following links: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html), [Link 3](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html).