Vulnerability Description
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tightvnc | Tightvnc | 1.3.10 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08
- https://usn.ubuntu.com/4407-1/
- https://www.openwall.com/lists/oss-security/2018/12/10/5Mailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08
- https://usn.ubuntu.com/4407-1/
- https://www.openwall.com/lists/oss-security/2018/12/10/5Mailing ListThird Party Advisory
FAQ
What is CVE-2019-15680?
CVE-2019-15680 is a vulnerability with a CVSS score of 7.5 (HIGH). TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
How severe is CVE-2019-15680?
CVE-2019-15680 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15680?
Check the references section above for vendor advisories and patch information. Affected products include: Tightvnc Tightvnc.