7.5
CVSSv3

CVE-2018-20023

Published: 19/12/2018 Updated: 23/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

LibVNC prior to 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows malicious user to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libvnc project libvncserver

debian debian linux 9.0

debian debian linux 8.0

canonical ubuntu linux 18.10

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #916941 libvncserver: Multiple security vulnerabilities Package: libvncserver; Maintainer for libvncserver is Peter Spiess-Knafl <dev@spiessknaflat>; Reported by: Markus Koschany <apo@debianorg> Date: Thu, 20 Dec 2018 18:21:01 UTC Severity: grave Tags: patch, security, upstream Found in ve ...
Several security issues were fixed in LibVNCServer ...
LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR ...