Description
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2045-1 | tightvnc security update |
EUVD |
EUVD-2019-6617 | TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity. |
References
History
No history.
Status: PUBLISHED
Assigner: Kaspersky
Published:
Updated: 2024-08-05T00:56:22.434Z
Reserved: 2019-08-27T00:00:00.000Z
Link: CVE-2019-15678
No data.
Status : Modified
Published: 2019-10-29T19:15:17.860
Modified: 2024-11-21T04:29:14.710
Link: CVE-2019-15678
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD