First published: Tue Apr 04 2017(Updated: )
In TigerVNC (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to a crash of the TigerVNC server. Upstream patch: <a href="https://github.com/TigerVNC/tigervnc/pull/438/commits/f3afa24da144409a3c3a0e35913112583d987671">https://github.com/TigerVNC/tigervnc/pull/438/commits/f3afa24da144409a3c3a0e35913112583d987671</a> Upstream bug: <a href="https://github.com/TigerVNC/tigervnc/issues/437">https://github.com/TigerVNC/tigervnc/issues/437</a>
Affected Software | Affected Version | How to fix |
---|---|---|
TigerVNC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1438697 is considered moderate due to the potential for a crash of the TigerVNC server.
To fix REDHAT-BUG-1438697, apply the upstream patch provided by TigerVNC as detailed in their GitHub repository.
REDHAT-BUG-1438697 affects the TigerVNC software, specifically impacting the handling of authenticated client connections.
REDHAT-BUG-1438697 allows an authenticated client to trigger a double free vulnerability, resulting in a server crash.
The vulnerability REDHAT-BUG-1438697 is attributed to the TigerVNC development team, who are responsible for maintaining and updating the software.