First published: Wed Nov 11 2020(Updated: )
A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libvncserver Project Libvncserver | =0.9.12 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
redhat/libvncserver | <0.9.13 | 0.9.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25708 is a divide by zero vulnerability in libvncserver-0.9.12.
CVE-2020-25708 has a severity value of 7.5 (high).
CVE-2020-25708 allows a malicious client to send a specially crafted message that triggers a divide by zero, leading to a floating point exception and denial of service.
To mitigate CVE-2020-25708, update libvncserver to version 0.9.13.
You can find more information about CVE-2020-25708 in the references section: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1896739), [Debian LTS Announce](https://lists.debian.org/debian-lts-announce/2022/09/msg00035.html), [GitHub Issue](https://github.com/LibVNC/libvncserver/issues/409).