Description
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-197-1 | libvncserver security update |
Debian DLA |
DLA-1979-1 | italc security update |
Debian DLA |
DLA-2014-1 | vino security update |
Debian DLA |
DLA-2045-1 | tightvnc security update |
Debian DSA |
DSA-3081-1 | libvncserver security update |
Ubuntu USN |
USN-2365-1 | LibVNCServer vulnerabilities |
Ubuntu USN |
USN-4573-1 | Vino vulnerabilities |
Ubuntu USN |
USN-4587-1 | iTALC vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T12:03:02.350Z
Reserved: 2014-09-01T00:00:00.000Z
Link: CVE-2014-6053
No data.
Status : Modified
Published: 2014-12-15T18:59:05.643
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-6053
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN