First published: Tue Apr 04 2017(Updated: )
In TigerVNC (SMsgReader.cxx SMsgReader::readClientCutText), an authenticated client can crash the server by causing an integer overflow. Upstream patch: <a href="https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689">https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689</a>
Affected Software | Affected Version | How to fix |
---|---|---|
TigerVNC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1438701 is typically classified as moderate due to the potential for a server crash.
To fix REDHAT-BUG-1438701, apply the upstream patches available for TigerVNC as indicated in the official repository.
REDHAT-BUG-1438701 specifically affects the TigerVNC server.
No, only authenticated clients can exploit the vulnerability described in REDHAT-BUG-1438701.
Currently, there are no documented workarounds for REDHAT-BUG-1438701, so updating to the patched version is recommended.