CVE-2019-15695

HIGH

Tigervnc < 1.10.1 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.

References (4)

Core 4
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1
Exploit, Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://www.openwall.com/lists/oss-security/2019/12/20/2
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html

Scores

CVSS v3 7.2
EPSS 0.0326
EPSS Percentile 87.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-754 CWE-121 CWE-787
Status published
Products (2)
opensuse/leap 15.1
tigervnc/tigervnc < 1.10.1
Published Dec 26, 2019
Tracked Since Feb 18, 2026