CVE-2019-15681

NameCVE-2019-15681
DescriptionLibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1977-1, DLA-1979-1, DLA-2014-1, DLA-2045-1
Debian Bugs943793, 945784

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvncserver (PTS)bullseye0.9.13+dfsg-2+deb11u1fixed
sid, trixie, bookworm0.9.14+dfsg-1fixed
tightvnc (PTS)bullseye1:1.3.10-3fixed
bookworm1:1.3.10-7fixed
sid, trixie1:1.3.10-9fixed
vino (PTS)sid, trixie, bookworm, bullseye3.22.0-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
italcsourcejessie1:2.0.2+dfsg1-2+deb8u1DLA-1979-1
italcsourcestretch1:3.0.3+dfsg1-1+deb9u1
italcsource(unstable)(unfixed)
libvncserversourceexperimental0.9.12+dfsg-1
libvncserversourcejessie0.9.9+dfsg2-6.1+deb8u6DLA-1977-1
libvncserversourcestretch0.9.11+dfsg-1.3~deb9u2
libvncserversourcebuster0.9.11+dfsg-1.3+deb10u1
libvncserversource(unstable)0.9.12+dfsg-3low943793
tightvncsourcejessie1.3.9-6.5+deb8u1DLA-2045-1
tightvncsourcestretch1:1.3.9-9+deb9u1
tightvncsourcebuster1:1.3.9-9deb10u1
tightvncsource(unstable)1:1.3.9-9.1
vinosourcejessie3.14.0-2+deb8u1DLA-2014-1
vinosource(unstable)3.22.0-6945784

Notes

[buster] - vino <no-dsa> (Minor issue)
[stretch] - vino <no-dsa> (Minor issue)
https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a

Search for package or bug name: Reporting problems