CVE-2019-8287

NameCVE-2019-8287
DescriptionTightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2045-1
Debian Bugs945364

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tightvnc (PTS)buster1:1.3.9-9+deb10u1fixed
bullseye1:1.3.10-3fixed
trixie, bookworm1:1.3.10-7fixed
sid1:1.3.10-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tightvncsourcejessie1.3.9-6.5+deb8u1DLA-2045-1
tightvncsourcestretch1:1.3.9-9+deb9u1
tightvncsourcebuster1:1.3.9-9deb10u1
tightvncsource(unstable)1:1.3.9-9.1945364

Notes

https://www.openwall.com/lists/oss-security/2018/12/10/5
same as CVE-2018-20020/libvncserver

Search for package or bug name: Reporting problems