LibVNCServer 缓冲区错误漏洞

admin 2024-01-15 03:48:33 YS 来源:ZONE.CI 全球网 0 阅读模式
> LibVNCServer 缓冲区错误漏洞

LibVNCServer 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-202006-1844 CVE编号 CVE-2017-18922
发布时间 2020-06-30 更新时间 2020-09-03
漏洞类型 缓冲区错误 漏洞来源 N/A
危险等级 超危 威胁类型 远程
厂商 N/A

漏洞介绍

LibVNCServer是一款支持在程序中实现VNC(虚拟网络计算)服务器或客户端功能的跨平台C语言库。

LibVNCServer 9.12之前版本中的websockets.c文件存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。

漏洞补丁

目前厂商已发布升级了LibVNCServer 缓冲区错误漏洞的补丁,LibVNCServer 缓冲区错误漏洞的补丁获取链接:

参考网址

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html

来源:MISC

链接:https://www.openwall.com/lists/oss-security/2020/06/30/2

来源:MISC

链接:https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/06/30/3

来源:MISC

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1852356

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html

来源:UBUNTU

链接:https://usn.ubuntu.com/4407-1/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158880/Red-Hat-Security-Advisory-2020-3456-01.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2017-18922

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158725/Red-Hat-Security-Advisory-2020-3281-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2469/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158809/Red-Hat-Security-Advisory-2020-3385-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2831/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2657/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2746/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159024/Red-Hat-Security-Advisory-2020-3588-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2727/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/LibVNCServer-buffer-overflow-via-websockets-c-32696

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3000/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202006-1844

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  3