MGASA-2017-0057

Source
https://advisories.mageia.org/MGASA-2017-0057.html
Import Source
https://advisories.mageia.org/MGASA-2017-0057.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0057
Related
Published
2017-02-20T13:00:19Z
Modified
2017-02-20T12:49:56Z
Summary
Updated gtk-vnc packages fix security vulnerability
Details

It was found that gtk-vnc code does not properly check boundaries of subrectangle-containing tiles. A malicious server can use this to overwrite parts of the client memory (CVE-2017-5884).

In addition, the vncconnectionservermessage() and vnccolormapset() functions do not check for integer overflow properly, leading to a malicious server being able to overwrite parts of the client memory (CVE-2017-5885).

References
Credits

Affected packages

Mageia:5 / gtk-vnc

Package

Name
gtk-vnc
Purl
pkg:rpm/mageia/gtk-vnc?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3-6.1.mga5

Ecosystem specific

{
    "section": "core"
}