TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "tigervnc-common", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-common-dbgsym", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-scraping-server", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-scraping-server-dbgsym", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-standalone-server", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-standalone-server-dbgsym", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-viewer", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-viewer-dbgsym", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-xorg-extension", "binary_version": "1.10.1+dfsg-1" }, { "binary_name": "tigervnc-xorg-extension-dbgsym", "binary_version": "1.10.1+dfsg-1" } ] }