Vulnerability Details : CVE-2019-15691
Potential exploit
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
Vulnerability category: Execute code
Products affected by CVE-2019-15691
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-15691
3.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-15691
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2019-15691
-
The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.Assigned by: nvd@nist.gov (Primary)
-
The product dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid.Assigned by: vulnerability@kaspersky.com (Secondary)
References for CVE-2019-15691
-
https://www.openwall.com/lists/oss-security/2019/12/20/2
oss-security - VNC vulnerabilities. TigerVNC security updateExploit;Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html
[security-announce] openSUSE-SU-2020:0087-1: important: Security updateThird Party Advisory
-
https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1
Release TigerVNC 1.10.1 · TigerVNC/tigervnc · GitHubRelease Notes;Third Party Advisory
-
https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40
Make ZlibInStream more robust against failures · CendioOssman/tigervnc@d61a767 · GitHubPatch;Third Party Advisory
Jump to