Vulnerability Description
Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | Fedora | 20 |
| Debian | Debian Linux | 7.0 |
| Redhat | Enterprise Linux Server Aus | 6.5 |
| Redhat | Enterprise Linux Server Eus | 6.5.z |
| Libvncserver | Libvncserver | <= 0.9.9 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.htThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.Third Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
- http://rhn.redhat.com/errata/RHSA-2015-0113.htmlThird Party Advisory
- http://seclists.org/oss-sec/2014/q3/639Mailing ListThird Party Advisory
- http://secunia.com/advisories/61506
- http://www.debian.org/security/2014/dsa-3081Third Party Advisory
- http://www.ocert.org/advisories/ocert-2014-007.htmlThird Party AdvisoryUS Government Resource
- http://www.openwall.com/lists/oss-security/2014/09/25/11Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/70096Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96187
- https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c5Issue TrackingPatch
- https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3bIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://security.gentoo.org/glsa/201507-07
FAQ
What is CVE-2014-6055?
CVE-2014-6055 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly e...
How severe is CVE-2014-6055?
CVE-2014-6055 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6055?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Fedora, Debian Debian Linux, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus, Libvncserver Libvncserver.