libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html | Mailing List Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf | Patch Third Party Advisory |
https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed | Patch Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2020-064-libvnc-libvncclient | Exploit Third Party Advisory |
https://usn.ubuntu.com/4407-1/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-04-23T18:06:55
Updated: 2021-12-14T13:06:28
Reserved: 2020-04-23T00:00:00
Link: CVE-2019-20788
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-04-23T19:15:12.763
Modified: 2022-03-10T14:54:00.837
Link: CVE-2019-20788
JSON object: View
Redhat Information
No data.