CVE-2019-8287

NameCVE-2019-8287
DescriptionTightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2045-1
NVD severityhigh
Debian Bugs945364

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tightvnc (PTS)stretch1:1.3.9-9+deb9u1fixed
buster1:1.3.9-9+deb10u1fixed
bullseye, sid1:1.3.9-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tightvncsourcejessie1.3.9-6.5+deb8u1DLA-2045-1
tightvncsourcestretch1:1.3.9-9+deb9u1
tightvncsourcebuster1:1.3.9-9deb10u1
tightvncsource(unstable)1:1.3.9-9.1945364

Notes

https://www.openwall.com/lists/oss-security/2018/12/10/5
same as CVE-2018-20020/libvncserver

Search for package or bug name: Reporting problems