Vulnerability Description
An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libvncserver Project | Libvncserver | <= 0.9.11 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.5 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2018/02/18/1ExploitMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/103107Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1055Third Party Advisory
- https://github.com/LibVNC/libvncserver/issues/218Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/03/msg00035.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://security.gentoo.org/glsa/201908-05
- https://usn.ubuntu.com/3618-1/Third Party Advisory
- https://usn.ubuntu.com/4547-1/
- https://usn.ubuntu.com/4573-1/
- https://usn.ubuntu.com/4587-1/
- https://www.debian.org/security/2018/dsa-4221Third Party Advisory
- http://www.openwall.com/lists/oss-security/2018/02/18/1ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2018-7225?
CVE-2018-7225 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive da...
How severe is CVE-2018-7225?
CVE-2018-7225 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-7225?
Check the references section above for vendor advisories and patch information. Affected products include: Libvncserver Project Libvncserver, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.