Vulnerability Details : CVE-2017-18922
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2017-18922
- cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
- cpe:2.3:a:libvncserver_project:libvncserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-18922
4.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-18922
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-18922
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-18922
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/
[SECURITY] Fedora 31 Update: libvncserver-0.9.13-2.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/
[SECURITY] Fedora 32 Update: libvncserver-0.9.13-2.fc32 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html
[security-announce] openSUSE-SU-2020:0978-1: important: Security updateMailing List;Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2020/06/30/2
oss-security - libvncserver: old websocket decoding patchMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1852356
1852356 – (CVE-2017-18922) CVE-2017-18922 libvncserver: websocket decoding buffer overflowIssue Tracking;Third Party Advisory
-
https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433
fix overflow and refactor websockets decode (Hybi) · LibVNC/libvncserver@aac95a9 · GitHubPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/06/30/3
oss-security - Re: libvncserver: old websocket decoding patchMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html
[security-announce] openSUSE-SU-2020:1025-1: important: Security updateMailing List;Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html
[security-announce] openSUSE-SU-2020:1056-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html
[security-announce] openSUSE-SU-2020:0988-1: important: Security updateMailing List;Third Party Advisory
-
https://usn.ubuntu.com/4407-1/
USN-4407-1: LibVNCServer vulnerabilities | Ubuntu security notices | UbuntuPatch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html
[security-announce] openSUSE-SU-2020:0960-1: important: Security updateMailing List;Third Party Advisory
Jump to