LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 24 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in libvncserver. An integer overflow within the HandleCursorShape() function can be exploited to cause a heap-based buffer overflow by tricking a user or application using libvncserver to connect to an unstrusted server and subsequently send cursor shapes with specially crafted dimensions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution. |
References |
| |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: Kaspersky
Published: 2025-01-24T17:53:58.866Z
Updated: 2025-01-24T18:22:55.433Z
Reserved: 2019-08-27T00:00:00.000Z
Link: CVE-2019-15690

Updated: 2025-01-24T18:22:51.425Z

Status : Received
Published: 2025-01-24T18:15:27.657
Modified: 2025-01-24T18:15:27.657
Link: CVE-2019-15690
