Vulnerability Details : CVE-2019-15692
Potential exploit
TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
Vulnerability category: OverflowMemory CorruptionExecute code
Products affected by CVE-2019-15692
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-15692
7.81%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-15692
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2019-15692
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: vulnerability@kaspersky.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-15692
-
https://www.openwall.com/lists/oss-security/2019/12/20/2
oss-security - VNC vulnerabilities. TigerVNC security updateExploit;Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html
[security-announce] openSUSE-SU-2020:0087-1: important: Security updateMailing List;Third Party Advisory
-
https://github.com/CendioOssman/tigervnc/commit/996356b6c65ca165ee1ea46a571c32a1dc3c3821
Restrict PixelBuffer dimensions to safe values · CendioOssman/tigervnc@996356b · GitHubPatch;Third Party Advisory
-
https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1
Release TigerVNC 1.10.1 · TigerVNC/tigervnc · GitHubRelease Notes;Third Party Advisory
Jump to