LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution.
History

Fri, 24 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Jan 2025 18:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in libvncserver. An integer overflow within the HandleCursorShape() function can be exploited to cause a heap-based buffer overflow by tricking a user or application using libvncserver to connect to an unstrusted server and subsequently send cursor shapes with specially crafted dimensions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution.
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Kaspersky

Published: 2025-01-24T17:53:58.866Z

Updated: 2025-01-24T18:22:55.433Z

Reserved: 2019-08-27T00:00:00.000Z

Link: CVE-2019-15690

cve-icon Vulnrichment

Updated: 2025-01-24T18:22:51.425Z

cve-icon NVD

Status : Received

Published: 2025-01-24T18:15:27.657

Modified: 2025-01-24T18:15:27.657

Link: CVE-2019-15690

cve-icon Redhat

Severity : Important

Publid Date: 2019-12-20T00:00:00Z

Links: CVE-2019-15690 - Bugzilla