Name | CVE-2018-20024 |
Description | LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1617-1, DLA-1979-1, DLA-2016-1, DSA-4383-1 |
Debian Bugs | 916941, 945827 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libvncserver (PTS) | bullseye | 0.9.13+dfsg-2+deb11u1 | fixed |
| sid, trixie, bookworm | 0.9.14+dfsg-1 | fixed |
ssvnc (PTS) | bullseye | 1.0.29-5 | fixed |
| bookworm | 1.0.29-6 | fixed |
| sid, trixie | 1.0.29-6.1 | fixed |
veyon (PTS) | bullseye | 4.5.3+repack1-1 | fixed |
| bookworm | 4.7.5+repack1-1 | fixed |
| sid, trixie | 4.7.5+repack1-1.2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://github.com/LibVNC/libvncserver/issues/254
https://github.com/LibVNC/libvncserver/commit/4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/