First published: Fri Oct 10 2014(Updated: )
This issue was discovered by Tim Waugh of Red Hat. Tigervnc is affected by same thing as in <a href="https://access.redhat.com/security/cve/CVE-2014-6051">CVE-2014-6051</a>. Integer overflaw leading to a heap-based buffer overflow was found in the way screen sizes were handled. A Malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client.
Affected Software | Affected Version | How to fix |
---|---|---|
TigerVNC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1151307 is considered critical due to the potential for a heap-based buffer overflow.
To fix REDHAT-BUG-1151307, update to the latest version of Red Hat Tigervnc.
Red Hat Tigervnc is the software affected by the vulnerability REDHAT-BUG-1151307.
REDHAT-BUG-1151307 is classified as a heap-based buffer overflow vulnerability.
REDHAT-BUG-1151307 was discovered by Tim Waugh of Red Hat.