TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
References
Configurations
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf - | |
References | () https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html - | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08 - | |
References | () https://usn.ubuntu.com/4407-1/ - | |
References | () https://www.openwall.com/lists/oss-security/2018/12/10/5 - Mailing List, Third Party Advisory |
Information
Published : 2019-10-29 19:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15680
Mitre link : CVE-2019-15680
CVE.ORG link : CVE-2019-15680
JSON object : View
Products Affected
tightvnc
- tightvnc
CWE
CWE-476
NULL Pointer Dereference