Bug 50913 - tightvnc: Multiple issues (4.3)
tightvnc: Multiple issues (4.3)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-5-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-03-09 20:40 CET by Quality Assurance
Modified: 2020-03-11 13:57 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) NVD RedHat


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-03-09 20:40:00 CET
New Debian tightvnc 1:1.3.9-9+deb9u1 fixes:
This update addresses the following issues:
* server NULL pointer dereference flaw in ClientCutText message handling  (CVE-2014-6053)
* Improper input sanitization in rfbProcessClientNormalMessage in rfbserver.c  (CVE-2018-7225)
* Infinite loop in VNC client code allows for denial of service  (CVE-2018-20021)
* Improper initialization in VNC client code allows for information  disclosure (CVE-2018-20022)
* TightVNC code version 1.3.10 contains global buffer overflow in  HandleCoRREBBP macro function, which can potentially result code execution.  This attack appear to be exploitable via network connectivity.  (CVE-2019-8287)
* TightVNC code version 1.3.10 contains heap buffer overflow in  rfbServerCutText handler, which can potentially result code execution..  This attack appear to be exploitable via network connectivity.  (CVE-2019-15678)
* TightVNC code version 1.3.10 contains heap buffer overflow in  InitialiseRFBConnection function, which can potentially result code  execution. This attack appear to be exploitable via network connectivity.  (CVE-2019-15679)
* TightVNC code version 1.3.10 contains null pointer dereference in  HandleZlibBPP function, which results Denial of System (DoS). This attack  appear to be exploitable via network connectivity. (CVE-2019-15680)
* LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a  memory leak (CWE-655) in VNC server code, which allow an attacker to read  stack memory and can be abused for information disclosure. Combined with  another vulnerability, it can be used to leak stack memory and bypass ASLR.  This attack appear to be exploitable via network connectivity. These  vulnerabilities have been fixed in commit  d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a. (CVE-2019-15681)
Comment 1 Quality Assurance univentionstaff 2020-03-09 21:00:41 CET
--- mirror/ftp/4.3/unmaintained/4.3-0/source/tightvnc_1.3.9-9.dsc
+++ apt/ucs_4.3-0-errata4.3-5/source/tightvnc_1.3.9-9+deb9u1.dsc
@@ -1,3 +1,24 @@
+1:1.3.9-9+deb9u1 [Sat, 21 Dec 2019 10:35:50 +0100] Mike Gabriel <sunweaver@debian.org>:
+
+  * Security upload. (Closes: #945364).
+  * CVE-2014-6053: Check malloc() return value on client->server ClientCutText
+    message.
+  * CVE-2019-8287 (aka CVE-2018-20020): Fix heap out-of-bound write
+    vulnerability inside structure in VNC client code.
+  * CVE-2018-20021: CWE-835: Infinite loop vulnerability in VNC client code.
+  * CVE-2018-20022: CWE-665: Improper Initialization vulnerability.
+  * CVE-2018-7225: Uninitialized and potentially sensitive data could be
+    accessed by remote attackers because the msg.cct.length in rfbserver.c was
+    not sanitized.
+  * CVE-2019-15678: LibVNCClient: ignore server-sent cut text longer than 1MB.
+  * Extra patch similar to the fix for CVE-2019-15678: LibVNCClient: ignore
+    server-sent reason strings longer than 1MB (see CVE-2018-20748/
+    libvncserver).
+  * CVE-2019-15679: rfbproto.c/InitialiseRFBConnection: Check desktop name
+    length received before allocating memory for it and limit it to 1MB.
+  * CVE-2019-15680: Fix null-pointer-deref issue in vncviewer/zlib.c.
+  * CVE-2019-15681: rfbserver: don't leak stack memory to the remote.
+
 1:1.3.9-9 [Fri, 27 Jan 2017 22:05:03 +0100] Ola Lundqvist <opal@debian.org>:
 
   * Reverted the transition. Tigervnc is not ready for being a full

<http://10.200.17.11/4.3-5/#9207684441389578367>
Comment 2 Philipp Hahn univentionstaff 2020-03-10 08:39:41 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.3-5] a4cb758b3d Bug #50913: tightvnc 1:1.3.9-9+deb9u1
 doc/errata/staging/tightvnc.yaml | 41 ++++++++++++++++++----------------------
 1 file changed, 18 insertions(+), 23 deletions(-)

[4.3-5] 73930d13fb Bug #50913: tightvnc 1:1.3.9-9+deb9u1
 doc/errata/staging/tightvnc.yaml | 49 ++++++++++++++++++++++++++++++++++++++++
 1 file changed, 49 insertions(+)
Comment 3 Erik Damrose univentionstaff 2020-03-11 13:57:25 CET
<http://errata.software-univention.de/ucs/4.3/655.html>