TigerVNC < 1.3.1 ZRLE Heap-based Buffer Overflow

medium Nessus Plugin ID 73339

Synopsis

The remote web server hosts a VNC application that is affected by a heap-based buffer overflow vulnerability.

Description

According to its self-identified version number, the TigerVNC install hosted on the remote web server is affected by a heap-based buffer overflow vulnerability.

A flaw exists when performing bounds check during ZRLE decoding. This could allow a remote attacker with a malicious server and a specially crafted request to execute arbitrary code.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to version 1.3.1 or later.

See Also

http://sourceforge.net/p/tigervnc/mailman/message/32120476/

Plugin Details

Severity: Medium

ID: 73339

File Name: tigervnc_1_3_1.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 4/4/2014

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:tigervnc:tigervnc

Required KB Items: Settings/ParanoidReport, Host/TigerVNC_Java_Viewer

Exploit Ease: No exploit is required

Patch Publication Date: 3/19/2014

Vulnerability Publication Date: 3/19/2014

Reference Information

CVE: CVE-2014-0011

BID: 66313