First published: Thu Dec 26 2019(Updated: )
TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tigervnc | <1.10.1 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15694 is a vulnerability in TigerVNC version prior to 1.10.1 that allows for a heap buffer overflow, potentially leading to remote code execution.
CVE-2019-15694 has a severity rating of 7.2 (High).
CVE-2019-15694 is caused by a signness error in processing MemOutStream, specifically in the DecodeManager::decodeRect function.
TigerVNC versions prior to 1.10.1 and openSUSE Leap 15.1 are affected by CVE-2019-15694.
To fix CVE-2019-15694, update TigerVNC to version 1.10.1 or higher.