First published: Tue Oct 29 2019(Updated: )
Last updated 24 July 2024
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tightvnc Tightvnc | =1.3.10 | |
debian/libvncserver | <=0.9.13+dfsg-2+deb11u1<=0.9.14+dfsg-1 | |
debian/tightvnc | 1:1.3.10-3 1:1.3.10-7 1:1.3.10-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15680 is a vulnerability in TightVNC code version 1.3.10 that contains a null pointer dereference in the HandleZlibBPP function, leading to a Denial of Service (DoS) attack.
CVE-2019-15680 has a severity rating of high with a score of 7.5.
The affected software includes TightVNC code version 1.3.10, libvncserver packages with specific versions, and Tightvnc packages with specific versions.
CVE-2019-15680 can be exploited through network connectivity.
More information about CVE-2019-15680 can be found at the MITRE CVE database (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15680) and the Openwall mailing list (https://www.openwall.com/lists/oss-security/2018/12/10/5).