TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
{
"binaries": [
{
"binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1",
"binary_name": "tightvncserver"
},
{
"binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1",
"binary_name": "xtightvncviewer"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}