CVE-2019-15681
Published: 29 October 2019
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
From the Ubuntu security team
Pavel Cheremushkin discovered that TightVNC has a memory leak vulnerability. An attacker could use it to disclosure sensitive information.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
italc Launchpad, Ubuntu, Debian |
Upstream |
Released
(1:3.0.3+dfsg1-1+deb9u1, 1:2.0.2+dfsg1-2+deb8u1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1:3.0.3+dfsg1-3ubuntu0.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:2.0.2+dfsg1-4ubuntu0.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needed)
|
|
krfb Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needs triage
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
libvncserver Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(0.9.12+dfsg-8)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(0.9.12+dfsg-8)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(0.9.11+dfsg-1ubuntu1.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(0.9.10+dfsg-3ubuntu0.16.04.4)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: Upstream: https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a |
||
tightvnc Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needs triage
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
veyon Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needs triage
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
vino Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(3.22.0-6ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(3.22.0-5ubuntu2.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(3.22.0-3ubuntu1.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(3.8.1-0ubuntu9.3)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
x11vnc Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needs triage
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needs triage
|