First published: Tue Oct 29 2019(Updated: )
Last updated 24 July 2024
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libvnc Project Libvncserver | <0.9.12 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Siemens Simatic Itc1500 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1500 | ||
Siemens Simatic Itc1500 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1500 Pro | ||
Siemens Simatic Itc1900 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1900 | ||
Siemens Simatic Itc1900 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1900 Pro | ||
Siemens Simatic Itc2200 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc2200 | ||
Siemens Simatic Itc2200 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc2200 Pro | ||
All of | ||
Siemens Simatic Itc1500 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1500 | ||
All of | ||
Siemens Simatic Itc1500 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1500 Pro | ||
All of | ||
Siemens Simatic Itc1900 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1900 | ||
All of | ||
Siemens Simatic Itc1900 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc1900 Pro | ||
All of | ||
Siemens Simatic Itc2200 Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc2200 | ||
All of | ||
Siemens Simatic Itc2200 Pro Firmware | >=3.0.0.0<3.2.1.0 | |
Siemens Simatic Itc2200 Pro | ||
debian/libvncserver | 0.9.13+dfsg-2+deb11u1 0.9.14+dfsg-1 | |
debian/tightvnc | 1:1.3.10-3 1:1.3.10-7 1:1.3.10-9 | |
debian/vino | 3.22.0-6 3.22.0-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15681 is a vulnerability in LibVNC server code that allows an attacker to read stack memory and potentially leak sensitive information.
CVE-2019-15681 has a severity rating of 7.5 (high).
CVE-2019-15681 affects libvncserver versions 0.9.11+dfsg-1ubuntu1.2, 0.9.11+dfsg-1.3ubuntu0.1, 0.9.10+dfsg-3ubuntu0.16.04.4, tightvnc version 1.3.9-6.5+, italc versions 1:3.0.3+dfsg1-3ubuntu0.1, 1:3.0.3+dfsg1-1+, 1:2.0.2+dfsg1-2+, 1:2.0.2+dfsg1-4ubuntu0.1, and vino versions 3.22.0-3ubuntu1.1, 3.22.0-5ubuntu2.1, 3.22.0-6ubuntu1, 3.8.1-0ubuntu9.3, 3.22.0-6ubuntu1.
To fix CVE-2019-15681, update to libvncserver version 0.9.11+dfsg-1ubuntu1.2, 0.9.11+dfsg-1.3ubuntu0.1, 0.9.10+dfsg-3ubuntu0.16.04.4, tightvnc version 1.3.9-6.5+, italc versions 1:3.0.3+dfsg1-3ubuntu0.1, 1:3.0.3+dfsg1-1+, 1:2.0.2+dfsg1-2+, 1:2.0.2+dfsg1-4ubuntu0.1, or vino versions 3.22.0-3ubuntu1.1, 3.22.0-5ubuntu2.1, 3.22.0-6ubuntu1, 3.8.1-0ubuntu9.3, 3.22.0-6ubuntu1.
CVE-2019-15681 can be combined with another vulnerability to bypass ASLR.