5
CVSSv2

CVE-2014-6053

Published: 15/12/2014 Updated: 23/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and previous versions does not properly handle attempts to send a large amount of ClientCutText data, which allows remote malicious users to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libvncserver libvncserver

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #762745 [CVE-2014-6051 to CVE-2014-6055] Multiple issues in libVNCserver Package: libvncserver; Maintainer for libvncserver is Peter Spiess-Knafl <dev@spiessknaflat>; Reported by: Luciano Bello <luciano@debianorg> Date: Wed, 24 Sep 2014 21:24:02 UTC Severity: grave Tags: patch, security Fi ...
Several security issues were fixed in LibVNCServer ...
Several vulnerabilities have been discovered in libvncserver, a library to implement VNC server functionality These vulnerabilities might result in the execution of arbitrary code or denial of service in both the client and the server side For the stable distribution (wheezy), these problems have been fixed in version 099+dfsg-1+deb7u1 For the ...
A NULL pointer dereference flaw was found in the way LibVNCServer handled certain ClientCutText message A remote attacker could use this flaw to crash the VNC server by sending a specially crafted ClientCutText message from a VNC client ...