Vulnerability Description
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libvnc Project | Libvncserver | < 0.9.12 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 8.0 |
| Siemens | Simatic Itc1500 Firmware | >= 3.0.0.0, < 3.2.1.0 |
| Siemens | Simatic Itc1500 | - |
| Siemens | Simatic Itc1500 Pro Firmware | >= 3.0.0.0, < 3.2.1.0 |
| Siemens | Simatic Itc1500 Pro | - |
| Siemens | Simatic Itc1900 Firmware | >= 3.0.0.0, < 3.2.1.0 |
| Siemens | Simatic Itc1900 | - |
| Siemens | Simatic Itc1900 Pro Firmware | >= 3.0.0.0, < 3.2.1.0 |
| Siemens | Simatic Itc1900 Pro | - |
| Siemens | Simatic Itc2200 Firmware | >= 3.0.0.0, < 3.2.1.0 |
| Siemens | Simatic Itc2200 | - |
| Siemens | Simatic Itc2200 Pro Firmware | >= 3.0.0.0, < 3.2.1.0 |
| Siemens | Simatic Itc2200 Pro | - |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.htmlMailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdfThird Party Advisory
- https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/10/msg00039.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/11/msg00032.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4407-1/Third Party Advisory
- https://usn.ubuntu.com/4547-1/Third Party Advisory
- https://usn.ubuntu.com/4573-1/Third Party Advisory
- https://usn.ubuntu.com/4587-1/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.htmlMailing ListThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdfThird Party Advisory
FAQ
What is CVE-2019-15681?
CVE-2019-15681 is a vulnerability with a CVSS score of 7.5 (HIGH). LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclo...
How severe is CVE-2019-15681?
CVE-2019-15681 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15681?
Check the references section above for vendor advisories and patch information. Affected products include: Libvnc Project Libvncserver, Canonical Ubuntu Linux, Debian Debian Linux, Siemens Simatic Itc1500 Firmware, Siemens Simatic Itc1500.