7.5
CVSSv3

CVE-2019-15681

Published: 29/10/2019 Updated: 05/04/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an malicious user to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libvnc project libvncserver

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

debian debian linux 8.0

debian debian linux 9.0

siemens simatic_itc1500_firmware

siemens simatic_itc1500_pro_firmware

siemens simatic_itc1900_firmware

siemens simatic_itc1900_pro_firmware

siemens simatic_itc2200_firmware

siemens simatic_itc2200_pro_firmware

Vendor Advisories

Debian Bug report logs - #943793 libvncserver: CVE-2019-15681 Package: src:libvncserver; Maintainer for src:libvncserver is Peter Spiess-Knafl <dev@spiessknaflat>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 29 Oct 2019 21:18:02 UTC Severity: grave Tags: security, upstream Found in versions lib ...