TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-common" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-common-dbgsym" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-scraping-server" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-scraping-server-dbgsym" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-standalone-server" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-standalone-server-dbgsym" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-viewer" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-viewer-dbgsym" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-xorg-extension" }, { "binary_version": "1.10.1+dfsg-1", "binary_name": "tigervnc-xorg-extension-dbgsym" } ] }