Vulnerability Description
RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realvnc | Vnc Viewer | 6.21.406 |
Related Weaknesses (CWE)
References
- https://gist.github.com/totaam/a90f2bb40f5b693ccec0ae903d021b03ExploitThird Party Advisory
- https://gist.github.com/totaam/a90f2bb40f5b693ccec0ae903d021b03ExploitThird Party Advisory
FAQ
What is CVE-2021-41380?
CVE-2021-41380 is a vulnerability with a CVSS score of 6.5 (MEDIUM). RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a use...
How severe is CVE-2021-41380?
CVE-2021-41380 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41380?
Check the references section above for vendor advisories and patch information. Affected products include: Realvnc Vnc Viewer.