LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
References
Link | Resource |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html | Mailing List Third Party Advisory |
https://github.com/LibVNC/libvncserver/issues/241 | Third Party Advisory |
https://usn.ubuntu.com/3877-1/ | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4383 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-12-19 08:29
Updated : 2019-10-30 18:15
NVD link : CVE-2018-6307
Mitre link : CVE-2018-6307
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
debian
- debian_linux
libvnc_project
- libvncserver
canonical
- ubuntu_linux