CVE-2014-6053

NameCVE-2014-6053
DescriptionThe rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-197-1, DSA-3081-1
NVD severitymedium (attack range: remote)
Debian Bugs762745

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvncserver (PTS)wheezy0.9.9+dfsg-1+deb7u1fixed
wheezy (security)0.9.9+dfsg-1+deb7u2fixed
jessie (security), jessie0.9.9+dfsg2-6.1+deb8u2fixed
buster, sid, stretch0.9.11+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvncserversource(unstable)0.9.9+dfsg-6.1medium762745
libvncserversourcesqueeze0.9.7-2+deb6u1mediumDLA-197-1
libvncserversourcewheezy0.9.9+dfsg-1+deb7u1mediumDSA-3081-1

Notes

https://github.com/newsoft/libvncserver/commit/6037a9074d52b1963c97cb28ea1096c7c14cbf28

Search for package or bug name: Reporting problems