7.5
CVSSv2

CVE-2019-8287

Published: 29/10/2019 Updated: 09/12/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tightvnc tightvnc 1.3.10

Vendor Advisories

Debian Bug report logs - #945364 Patches available for CVE-2019-8287, CVE-2019-15678, CVE-2019-15679, CVE-2019-15680 Package: src:tightvnc; Maintainer for src:tightvnc is Ola Lundqvist <opal@debianorg>; Reported by: bugs@humanlegorguk Date: Sat, 23 Nov 2019 16:27:02 UTC Severity: normal Tags: security, upstream Found i ...