Vulnerability Description
Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Server Aus | 6.5 |
| Redhat | Enterprise Linux Server Eus | 6.5.z |
| Fedoraproject | Fedora | 20 |
| Libvncserver | Libvncserver | <= 0.9.9 |
| Debian | Debian Linux | 7.0 |
| Oracle | Solaris | 11.3 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.htThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.Third Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
- http://rhn.redhat.com/errata/RHSA-2015-0113.htmlThird Party Advisory
- http://seclists.org/oss-sec/2014/q3/639Third Party Advisory
- http://secunia.com/advisories/61506Permissions RequiredThird Party Advisory
- http://www.debian.org/security/2014/dsa-3081Third Party Advisory
- http://www.ocert.org/advisories/ocert-2014-007.htmlPatchThird Party AdvisoryUS Government Resource
- http://www.openwall.com/lists/oss-security/2014/09/25/11Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
- http://www.securityfocus.com/bid/70093
- https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://security.gentoo.org/glsa/201507-07
- https://security.gentoo.org/glsa/201612-36
FAQ
What is CVE-2014-6051?
CVE-2014-6051 is a vulnerability with a CVSS score of 7.5 (HIGH). Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code v...
How severe is CVE-2014-6051?
CVE-2014-6051 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6051?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus, Fedoraproject Fedora, Libvncserver Libvncserver, Debian Debian Linux.