CVE-2019-8287

NameCVE-2019-8287
DescriptionTightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2045-1
NVD severityhigh
Debian Bugs945364

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tightvnc (PTS)jessie1.3.9-6.5vulnerable
jessie (security)1.3.9-6.5+deb8u1fixed
buster, stretch1:1.3.9-9vulnerable
bullseye, sid1:1.3.9-9.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tightvncsource(unstable)1:1.3.9-9.1945364
tightvncsourcejessie1.3.9-6.5+deb8u1DLA-2045-1

Notes

[buster] - tightvnc <no-dsa> (Minor issue; will be fixed via point release)
[stretch] - tightvnc <no-dsa> (Minor issue; will be fixed via point release)
https://www.openwall.com/lists/oss-security/2018/12/10/5
same as CVE-2018-20020/libvncserver

Search for package or bug name: Reporting problems