7.5
CVSSv2

CVE-2014-8240

Published: 16/10/2014 Updated: 08/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in TigerVNC allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to screen size handling, which triggers a heap-based buffer overflow, a similar issue to CVE-2014-6051.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tigervnc tigervnc 1.0.1

tigervnc tigervnc 1.1.0

tigervnc tigervnc 0.0.90

tigervnc tigervnc 0.0.91

tigervnc tigervnc 1.0.0

Vendor Advisories

Synopsis Moderate: tigervnc security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated tigervnc packages that fix two security issues, several bugs, andadd various enhancements are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this upd ...
Debian Bug report logs - #849479 tigervnc: CVE-2014-8240: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling Package: src:tigervnc; Maintainer for src:tigervnc is TigerVNC Packaging Team <pkg-tigervnc-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg&gt ...
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way TigerVNC handled screen sizes A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client A NULL pointer dereference flaw was found in TigerVNC's XRegion A malicious VNC server could use this fla ...
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way TigerVNC handled screen sizes A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client ...