First published: Mon Feb 19 2018(Updated: )
An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libvncserver Project Libvncserver | <=0.9.11 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/libvncserver | 0.9.13+dfsg-2+deb11u1 0.9.14+dfsg-1 | |
debian/tightvnc | 1:1.3.10-3 1:1.3.10-7 1:1.3.10-9 | |
debian/vino | 3.22.0-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7225 is a vulnerability in LibVNCServer that allows access to uninitialized and potentially sensitive data.
CVE-2018-7225 has a severity rating of 9.8 (critical).
CVE-2018-7225 can lead to access to uninitialized and potentially sensitive data or unspecified other impact.
You can find more information about CVE-2018-7225 on the GitHub page and the Debian security tracker.
The Common Weakness Enumeration (CWE) associated with CVE-2018-7225 is CWE-190.