CVE-2014-6054

NameCVE-2014-6054
DescriptionThe rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-197-1, DLA-1979-1, DSA-3081-1
NVD severitymedium
Debian Bugs762745

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
italc (PTS)jessie1:2.0.2+dfsg1-2vulnerable
jessie (security)1:2.0.2+dfsg1-2+deb8u1fixed
stretch1:3.0.3+dfsg1-1vulnerable
libvncserver (PTS)jessie0.9.9+dfsg2-6.1+deb8u3fixed
jessie (security)0.9.9+dfsg2-6.1+deb8u6fixed
stretch (security), stretch0.9.11+dfsg-1.3~deb9u1fixed
bullseye, sid, buster0.9.11+dfsg-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
italcsource(unstable)(unfixed)
italcsourcejessie1:2.0.2+dfsg1-2+deb8u1DLA-1979-1
libvncserversource(unstable)0.9.9+dfsg-6.1762745
libvncserversourcesqueeze0.9.7-2+deb6u1DLA-197-1
libvncserversourcewheezy0.9.9+dfsg-1+deb7u1DSA-3081-1

Notes

https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
https://github.com/newsoft/libvncserver/commit/f18f24ce65f5cac22ddcf3ed51417e477f9bad09 (hardening)
https://github.com/newsoft/libvncserver/commit/5dee1cbcd83920370a487c4fd2718aa4d3eba548 (required for sparc)
https://github.com/newsoft/libvncserver/commit/819481c5e2003cd36d002336c248de8c75de362e (hardening)
https://github.com/newsoft/libvncserver/commit/e5d9b6a07257c12bf3b6242ddea79ea1c95353a8 (hardening)

Search for package or bug name: Reporting problems