Search CVE reports


Toggle filters

1 – 7 of 7 results


CVE-2019-15680

Low priority

Some fixes available 5 of 73

TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.

6 affected packages

tightvnc, libvncserver, ssvnc, veyon, vncsnapshot, x11vnc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tightvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libvncserver Not affected Not affected Fixed Fixed
ssvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
veyon Needs evaluation Needs evaluation Needs evaluation Not in release
vncsnapshot Needs evaluation Needs evaluation Needs evaluation Needs evaluation
x11vnc Not affected Not affected Not affected Not affected
Show less packages

CVE-2019-15679

Medium priority

Some fixes available 1 of 83

TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

7 affected packages

libvncserver, tightvnc, x11vnc, ssvnc, veyon...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libvncserver Not affected Not affected Not affected Not affected
tightvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
x11vnc Not affected Not affected Not affected Not affected
ssvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
veyon Needs evaluation Needs evaluation Needs evaluation Not in release
vncsnapshot Needs evaluation Needs evaluation Needs evaluation Needs evaluation
x2vnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show all 7 packages Show less packages

CVE-2019-15678

Medium priority

Some fixes available 1 of 120

TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.

11 affected packages

bochs, directvnc, libvncserver, ssvnc, tightvnc...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
bochs Needs evaluation Needs evaluation Needs evaluation Needs evaluation
directvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libvncserver Not affected Not affected Not affected Not affected
ssvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
tightvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
vino Not affected Not affected Not affected Not affected
veyon Needs evaluation Needs evaluation Needs evaluation Not in release
vlc Not affected Not affected Not affected Not affected
vncsnapshot Needs evaluation Needs evaluation Needs evaluation Needs evaluation
x11vnc Not affected Not affected Not affected Not affected
x2vnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show all 11 packages Show less packages

CVE-2018-20024

Medium priority

Some fixes available 7 of 9

LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.

4 affected packages

libvncserver, x11vnc, italc, ssvnc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libvncserver Not affected Not affected Not affected Fixed
x11vnc Not affected Not affected Not affected Not affected
italc Not in release Not in release Not in release Fixed
ssvnc Not affected Not affected Not affected Vulnerable
Show less packages

CVE-2018-20022

Medium priority

Some fixes available 8 of 23

LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information...

5 affected packages

tightvnc, italc, libvncserver, ssvnc, x11vnc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tightvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
italc Not in release Not in release Not in release Fixed
libvncserver Not affected Not affected Not affected Fixed
ssvnc Not affected Not affected Not affected Vulnerable
x11vnc Not affected Not affected Not affected Not affected
Show less packages

CVE-2018-20021

Medium priority

Some fixes available 8 of 23

LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM

5 affected packages

italc, tightvnc, libvncserver, ssvnc, x11vnc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
italc Not in release Not in release Not in release Fixed
tightvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libvncserver Not affected Not affected Not affected Fixed
ssvnc Not affected Not affected Not affected Vulnerable
x11vnc Not affected Not affected Not affected Not affected
Show less packages

CVE-2018-20020

Medium priority

Some fixes available 8 of 23

LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution

5 affected packages

tightvnc, libvncserver, x11vnc, italc, ssvnc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
tightvnc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libvncserver Not affected Not affected Not affected Fixed
x11vnc Not affected Not affected Not affected Not affected
italc Not in release Not in release Not in release Fixed
ssvnc Not affected Not affected Not affected Vulnerable
Show less packages