libvncserver.so is vulnerable to denial of service (DoS) attacks. The vulnerability exists due to the lack of size validation of msg.cct.legnth
in the rfbProcessClientNormalMessage
function of libvncserver/rfbserver.c
, potentially causing a denial of service (DoS) attack.
www.openwall.com/lists/oss-security/2018/02/18/1
www.securityfocus.com/bid/103107
access.redhat.com/errata/RHSA-2018:1055
bugzilla.redhat.com/show_bug.cgi?id=1546858
github.com/LibVNC/libvncserver/issues/218
github.com/LibVNC/libvncserver/pull/221
github.com/ppisar/libvncserver/commit/0073e4f694d5a51bb72ff12a5e8364b6e752e094
lists.debian.org/debian-lts-announce/2018/03/msg00035.html
lists.debian.org/debian-lts-announce/2019/10/msg00042.html
lists.debian.org/debian-lts-announce/2019/11/msg00032.html
lists.debian.org/debian-lts-announce/2019/12/msg00028.html
security.gentoo.org/glsa/201908-05
usn.ubuntu.com/3618-1/
usn.ubuntu.com/4547-1/
usn.ubuntu.com/4573-1/
usn.ubuntu.com/4587-1/
www.debian.org/security/2018/dsa-4221