#VU23903 Heap-based buffer overflow in TigerVNC - CVE-2019-15694
Published: January 3, 2020 / Updated: March 24, 2020
Vulnerability identifier: #VU23903
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-15694
CWE-ID: CWE-122
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
TigerVNC
TigerVNC
Software vendor:
tigervnc.org
tigervnc.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the signedness error in processing MemOutStream. A remote attacker can trigger heap-based buffer overflow from DecodeManager::decodeRect and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install updates from vendor's website.
External links
- https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438
- https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1
- https://www.openwall.com/lists/oss-security/2019/12/20/2
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2020/03/23/klcert-20-008-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/