CVE-2018-20022

NameCVE-2018-20022
DescriptionLibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1617-1, DLA-1979-1, DLA-2016-1, DLA-2045-1, DSA-4383-1
NVD severitymedium
Debian Bugs916941, 945827

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
italc (PTS)jessie1:2.0.2+dfsg1-2vulnerable
jessie (security)1:2.0.2+dfsg1-2+deb8u1fixed
stretch1:3.0.3+dfsg1-1vulnerable
libvncserver (PTS)jessie0.9.9+dfsg2-6.1+deb8u3vulnerable
jessie (security)0.9.9+dfsg2-6.1+deb8u6fixed
stretch (security), stretch0.9.11+dfsg-1.3~deb9u1fixed
buster0.9.11+dfsg-1.3fixed
bullseye, sid0.9.12+dfsg-7fixed
ssvnc (PTS)jessie1.0.29-2vulnerable
jessie (security)1.0.29-2+deb8u1fixed
stretch1.0.29-3vulnerable
buster1.0.29-4vulnerable
bullseye, sid1.0.29-5fixed
tightvnc (PTS)jessie1.3.9-6.5vulnerable
jessie (security)1.3.9-6.5+deb8u1fixed
buster, stretch1:1.3.9-9vulnerable
bullseye, sid1:1.3.9-9.1fixed
veyon (PTS)buster4.1.7+repack1-1fixed
bullseye, sid4.3.1+repack1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
italcsource(unstable)(unfixed)
italcsourcejessie1:2.0.2+dfsg1-2+deb8u1DLA-1979-1
libvncserversource(unstable)0.9.11+dfsg-1.2916941
libvncserversourcejessie0.9.9+dfsg2-6.1+deb8u4DLA-1617-1
libvncserversourcestretch0.9.11+dfsg-1.3~deb9u1DSA-4383-1
ssvncsource(unstable)1.0.29-5945827
ssvncsourcejessie1.0.29-2+deb8u1DLA-2016-1
tightvncsource(unstable)1:1.3.9-9.1
tightvncsourcejessie1.3.9-6.5+deb8u1DLA-2045-1
veyonsource(unstable)4.1.4+repack1-1

Notes

[buster] - tightvnc <no-dsa> (Minor issue; will be fixed via point release)
[stretch] - tightvnc <no-dsa> (Minor issue; will be fixed via point release)
https://github.com/LibVNC/libvncserver/issues/252
https://github.com/LibVNC/libvncserver/commit/2f5b2ad1c6c99b1ac6482c95844a84d66bb52838
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/

Search for package or bug name: Reporting problems