UBUNTU-CVE-2019-15679

Source
https://ubuntu.com/security/CVE-2019-15679
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-15679
Upstream
Published
2019-10-29T19:15:00Z
Modified
2025-10-24T04:47:49Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

References

Affected packages

Ubuntu:14.04:LTS

x11vnc

Package

Name
x11vnc
Purl
pkg:deb/ubuntu/x11vnc@0.9.13-1.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.9.13-1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x11vnc",
            "binary_version": "0.9.13-1.1"
        },
        {
            "binary_name": "x11vnc-data",
            "binary_version": "0.9.13-1.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:16.04:LTS

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-2+deb8u1build0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-2build1
1.0.29-2+deb8u1build0.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-2+deb8u1build0.16.04.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1.3.10-0ubuntu3?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.10-0ubuntu2
1.3.10-0ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncserver",
            "binary_version": "1.3.10-0ubuntu3"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1.3.10-0ubuntu3"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-5.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-5.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-5.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2-5?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2-5"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:18.04:LTS

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-3build1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-3
1.0.29-3build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-3build1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1.3.10-0ubuntu4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.10-0ubuntu3
1.3.10-0ubuntu4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncserver",
            "binary_version": "1.3.10-0ubuntu4"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1.3.10-0ubuntu4"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-5.1build1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-5.1
1.2a-5.1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-5.1build1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2-6?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2-6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2-6"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:20.04:LTS

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-5?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-4build1
1.0.29-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-5"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1.3.10-0ubuntu5?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.10-0ubuntu5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncserver",
            "binary_version": "1.3.10-0ubuntu5"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1.3.10-0ubuntu5"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

veyon

Package

Name
veyon
Purl
pkg:deb/ubuntu/veyon@4.3.1+repack1-2build2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.2.4+repack1-2
4.2.5+repack1-1
4.3.1+repack1-1
4.3.1+repack1-2
4.3.1+repack1-2build1
4.3.1+repack1-2build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libveyon-core",
            "binary_version": "4.3.1+repack1-2build2"
        },
        {
            "binary_name": "veyon-configurator",
            "binary_version": "4.3.1+repack1-2build2"
        },
        {
            "binary_name": "veyon-master",
            "binary_version": "4.3.1+repack1-2build2"
        },
        {
            "binary_name": "veyon-plugins",
            "binary_version": "4.3.1+repack1-2build2"
        },
        {
            "binary_name": "veyon-service",
            "binary_version": "4.3.1+repack1-2build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-5.1build2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-5.1build1
1.2a-5.1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-5.1build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2-6?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2-6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2-6"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:22.04:LTS

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-5
1.0.29-5build1
1.0.29-6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-6"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1:1.3.10-5?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.3.10-3
1:1.3.10-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncpasswd",
            "binary_version": "1:1.3.10-5"
        },
        {
            "binary_name": "tightvncserver",
            "binary_version": "1:1.3.10-5"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1:1.3.10-5"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

veyon

Package

Name
veyon
Purl
pkg:deb/ubuntu/veyon@4.5.3+repack1-1build2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.5.3+repack1-1build1
4.5.3+repack1-1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libveyon-core",
            "binary_version": "4.5.3+repack1-1build2"
        },
        {
            "binary_name": "veyon-configurator",
            "binary_version": "4.5.3+repack1-1build2"
        },
        {
            "binary_name": "veyon-master",
            "binary_version": "4.5.3+repack1-1build2"
        },
        {
            "binary_name": "veyon-plugins",
            "binary_version": "4.5.3+repack1-1build2"
        },
        {
            "binary_name": "veyon-service",
            "binary_version": "4.5.3+repack1-1build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-5.1build2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-5.1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-5.1build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2-6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2-6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2-6"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:24.04:LTS

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-6ubuntu3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-6
1.0.29-6ubuntu1
1.0.29-6ubuntu2
1.0.29-6ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-6ubuntu3"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1:1.3.10-8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.3.10-7
1:1.3.10-7build1
1:1.3.10-7build2
1:1.3.10-8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncpasswd",
            "binary_version": "1:1.3.10-8"
        },
        {
            "binary_name": "tightvncserver",
            "binary_version": "1:1.3.10-8"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1:1.3.10-8"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

veyon

Package

Name
veyon
Purl
pkg:deb/ubuntu/veyon@4.7.5+repack1-1ubuntu5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.7.5+repack1-1build2
4.7.5+repack1-1ubuntu1
4.7.5+repack1-1ubuntu3
4.7.5+repack1-1ubuntu4
4.7.5+repack1-1ubuntu5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libveyon-core",
            "binary_version": "4.7.5+repack1-1ubuntu5"
        },
        {
            "binary_name": "veyon-configurator",
            "binary_version": "4.7.5+repack1-1ubuntu5"
        },
        {
            "binary_name": "veyon-master",
            "binary_version": "4.7.5+repack1-1ubuntu5"
        },
        {
            "binary_name": "veyon-plugins",
            "binary_version": "4.7.5+repack1-1ubuntu5"
        },
        {
            "binary_name": "veyon-service",
            "binary_version": "4.7.5+repack1-1ubuntu5"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-5.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-5.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-5.2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2-6build1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2-6
1.7.2-6build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2-6build1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:25.04

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-6.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-6ubuntu3
1.0.29-6.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-6.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1:1.3.10-9?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.3.10-9

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncpasswd",
            "binary_version": "1:1.3.10-9"
        },
        {
            "binary_name": "tightvncserver",
            "binary_version": "1:1.3.10-9"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1:1.3.10-9"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

veyon

Package

Name
veyon
Purl
pkg:deb/ubuntu/veyon@4.7.5+repack1-1ubuntu6?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.7.5+repack1-1ubuntu6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libveyon-core",
            "binary_version": "4.7.5+repack1-1ubuntu6"
        },
        {
            "binary_name": "veyon-configurator",
            "binary_version": "4.7.5+repack1-1ubuntu6"
        },
        {
            "binary_name": "veyon-master",
            "binary_version": "4.7.5+repack1-1ubuntu6"
        },
        {
            "binary_name": "veyon-plugins",
            "binary_version": "4.7.5+repack1-1ubuntu6"
        },
        {
            "binary_name": "veyon-service",
            "binary_version": "4.7.5+repack1-1ubuntu6"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-6?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-5.2
1.2a-6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-6"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2+git20100909.01ced3d-1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2-6build1
1.7.2+git20100909.01ced3d-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2+git20100909.01ced3d-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:25.10

ssvnc

Package

Name
ssvnc
Purl
pkg:deb/ubuntu/ssvnc@1.0.29-7?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.29-6.1
1.0.29-7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "ssvnc",
            "binary_version": "1.0.29-7"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1:1.3.10-10?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.3.10-9
1:1.3.10-10

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncpasswd",
            "binary_version": "1:1.3.10-10"
        },
        {
            "binary_name": "tightvncserver",
            "binary_version": "1:1.3.10-10"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1:1.3.10-10"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

veyon

Package

Name
veyon
Purl
pkg:deb/ubuntu/veyon@4.9.7+repack1-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.7.5+repack1-1ubuntu6
4.7.5+repack1-1ubuntu7
4.9.7+repack1-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libveyon-core",
            "binary_version": "4.9.7+repack1-1"
        },
        {
            "binary_name": "veyon-configurator",
            "binary_version": "4.9.7+repack1-1"
        },
        {
            "binary_name": "veyon-master",
            "binary_version": "4.9.7+repack1-1"
        },
        {
            "binary_name": "veyon-plugins",
            "binary_version": "4.9.7+repack1-1"
        },
        {
            "binary_name": "veyon-service",
            "binary_version": "4.9.7+repack1-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

vncsnapshot

Package

Name
vncsnapshot
Purl
pkg:deb/ubuntu/vncsnapshot@1.2a-7?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2a-6
1.2a-7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vncsnapshot",
            "binary_version": "1.2a-7"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

x2vnc

Package

Name
x2vnc
Purl
pkg:deb/ubuntu/x2vnc@1.7.2+git20100909.01ced3d-2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.2+git20100909.01ced3d-1
1.7.2+git20100909.01ced3d-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "x2vnc",
            "binary_version": "1.7.2+git20100909.01ced3d-2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"

Ubuntu:Pro:14.04:LTS

tightvnc

Package

Name
tightvnc
Purl
pkg:deb/ubuntu/tightvnc@1.3.9-6.5+deb8u1build0.14.04.1~esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.9-6.5+deb8u1build0.14.04.1~esm1

Affected versions

1.*

1.3.9-6.4
1.3.9-6.4ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tightvncserver",
            "binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1"
        },
        {
            "binary_name": "xtightvncviewer",
            "binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15679.json"