CVE-2014-6054

NameCVE-2014-6054
DescriptionThe rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-197-1, DSA-3081-1
NVD severitymedium (attack range: remote)
Debian Bugs762745

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvncserver (PTS)wheezy0.9.9+dfsg-1+deb7u1fixed
wheezy (security)0.9.9+dfsg-1+deb7u2fixed
jessie (security), jessie0.9.9+dfsg2-6.1+deb8u2fixed
buster, sid, stretch0.9.11+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvncserversource(unstable)0.9.9+dfsg-6.1medium762745
libvncserversourcesqueeze0.9.7-2+deb6u1mediumDLA-197-1
libvncserversourcewheezy0.9.9+dfsg-1+deb7u1mediumDSA-3081-1

Notes

https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
https://github.com/newsoft/libvncserver/commit/f18f24ce65f5cac22ddcf3ed51417e477f9bad09 (hardening)
https://github.com/newsoft/libvncserver/commit/5dee1cbcd83920370a487c4fd2718aa4d3eba548 (required for sparc)
https://github.com/newsoft/libvncserver/commit/819481c5e2003cd36d002336c248de8c75de362e (hardening)
https://github.com/newsoft/libvncserver/commit/e5d9b6a07257c12bf3b6242ddea79ea1c95353a8 (hardening)

Search for package or bug name: Reporting problems