CVE-2018-20023

NameCVE-2018-20023
DescriptionLibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1617-1, DSA-4383-1
NVD severitymedium (attack range: remote)
Debian Bugs916941

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvncserver (PTS)jessie0.9.9+dfsg2-6.1+deb8u3vulnerable
jessie (security)0.9.9+dfsg2-6.1+deb8u5fixed
stretch (security), stretch0.9.11+dfsg-1.3~deb9u1fixed
buster, sid0.9.11+dfsg-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvncserversource(unstable)0.9.11+dfsg-1.2medium916941
libvncserversourcejessie0.9.9+dfsg2-6.1+deb8u4mediumDLA-1617-1
libvncserversourcestretch0.9.11+dfsg-1.3~deb9u1mediumDSA-4383-1

Notes

https://github.com/LibVNC/libvncserver/issues/253
https://github.com/LibVNC/libvncserver/commit/8b06f835e259652b0ff026898014fc7297ade858
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/

Search for package or bug name: Reporting problems