First published: Fri Feb 03 2017(Updated: )
It was found that gtk-vnc does not properly check boundaries of subrectangle-containing tiles. A malicious server can use this to overwrite parts of the client memory, potentially leading to code execution under privileges of the user running the VNC client. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=778048">https://bugzilla.gnome.org/show_bug.cgi?id=778048</a> Upstream patch: <a href="https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178">https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GTK-VNC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1418944 is high due to the potential for code execution and memory corruption.
To fix REDHAT-BUG-1418944, update gtk-vnc to the latest patched version as recommended by the vendor.
The potential impacts of REDHAT-BUG-1418944 include unauthorized code execution and compromise of user privileges.
Users running a vulnerable version of gtk-vnc are affected by REDHAT-BUG-1418944.
REDHAT-BUG-1418944 is caused by improper boundary checks in the handling of subrectangle-containing tiles.