CVE-2014-6051

Related Vulnerabilities: CVE-2014-6051  

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way screen sizes were handled by LibVNCServer. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code in the client.

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way screen sizes were handled by LibVNCServer. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code in the client.

Find out more about CVE-2014-6051 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 6
Base Metrics AV:N/AC:M/Au:S/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Extended Update Support 6.5 (libvncserver) RHSA-2015:0113 2015-02-02
Red Hat Enterprise Linux 6 (libvncserver) RHSA-2014:1826 2014-11-11
Red Hat Enterprise Linux 7 (libvncserver) RHSA-2014:1826 2014-11-11

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 kdenetwork Not affected
Red Hat Enterprise Linux 6 kdenetwork Not affected
Red Hat Enterprise Linux 5 kdenetwork Not affected

Acknowledgements

Red Hat would like to thank oCERT for reporting this issue. oCERT acknowledges Nicolas RUFF as the original reporter.