First published: Fri Sep 19 2014(Updated: )
Two stack-based buffer overflow flaws were reported in LibVNCServer's file transfer handling. A VNC client could use these flaws to cause the VNC server to crash or, potentially, execute arbitrary code. Upstream commits: <a href="https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e">https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e</a> <a href="https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677">https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvncserver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1144293 is classified as a critical vulnerability due to its potential for remote code execution.
To fix REDHAT-BUG-1144293, update the LibVNCServer to the latest version where the buffer overflow vulnerabilities have been addressed.
REDHAT-BUG-1144293 affects systems running vulnerable versions of LibVNCServer.
An attacker exploiting REDHAT-BUG-1144293 could crash the VNC server or potentially execute arbitrary code.
There is no specific workaround for REDHAT-BUG-1144293; the best course of action is to apply the necessary updates to LibVNCServer.