USN-4587-1: iTALC vulnerabilities

20 October 2020

Several security issues were fixed in iTALC.

Releases

Packages

  • italc - didact tool which allows teachers to view and control computer labs

Details

Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors
and didn't check malloc return values. A remote attacker could use these issues
to cause a denial of service or possibly execute arbitrary code.
(CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055)

Josef Gajdusek discovered that iTALC had heap-based buffer overflow
vulnerabilities. A remote attacker could used these issues to cause a denial of
service or possibly execute arbitrary code. (CVE-2016-9941, CVE-2016-9942)

It was discovered that iTALC had an out-of-bounds write, multiple heap
out-of-bounds writes, an infinite loop, improper initializations, and null
pointer vulnerabilities. A remote attacker could used these issues to cause a
denial of service or possibly execute arbitrary code. (CVE-2018-15127,
CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023,
CVE-2018-20024, CVE-2018-20748, CVE-2018-20749, CVE-2018-20750, CVE-2018-7225,
CVE-2019-15681)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-4547-1: italc-client, italc, libitalccore, italc-master
  • USN-3171-1: libvncserver0, libvncserver1, libvncserver, libvncclient1
  • USN-4407-1: libvncserver1, libvncserver, libvncclient1
  • USN-4547-2: ssvnc
  • USN-3618-1: libvncserver0, libvncserver1, libvncserver, libvncclient1
  • USN-2365-1: libvncserver0, libvncserver
  • USN-4573-1: vino
  • USN-3877-1: libvncserver0, libvncserver1, libvncserver, libvncclient1