CVE Vulnerabilities

CVE-2014-6053

Published: Dec 15, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
6 MODERATE
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.

Affected Software

NameVendorStart VersionEnd Version
LibvncserverLibvncserver*0.9.9 (including)
Red Hat Enterprise Linux 6RedHatlibvncserver-0:0.9.7-7.el6_6.1*
Red Hat Enterprise Linux 7RedHatlibvncserver-0:0.9.9-9.el7_0.1*
Red Hat Enterprise Linux 7RedHatkdenetwork-7:4.10.5-8.el7_0*
ItalcUbuntuesm-apps/xenial*
ItalcUbuntutrusty*
ItalcUbuntuxenial*
KrfbUbuntutrusty*
LibvncserverUbuntulucid*
LibvncserverUbuntuprecise*
LibvncserverUbuntutrusty*
TightvncUbuntubionic*
TightvncUbuntuesm-infra-legacy/trusty*
TightvncUbuntufocal*
TightvncUbuntugroovy*
TightvncUbuntuhirsute*
TightvncUbuntuimpish*
TightvncUbuntukinetic*
TightvncUbuntulunar*
TightvncUbuntumantic*
TightvncUbuntuoracular*
TightvncUbuntuplucky*
TightvncUbuntutrusty*
TightvncUbuntutrusty/esm*
TightvncUbuntuupstream*
TightvncUbuntuxenial*
VinoUbuntubionic*
VinoUbuntuesm-apps/jammy*
VinoUbuntuesm-apps/noble*
VinoUbuntuesm-infra/bionic*
VinoUbuntuesm-infra/focal*
VinoUbuntuesm-infra/xenial*
VinoUbuntufocal*
VinoUbuntugroovy*
VinoUbuntuhirsute*
VinoUbuntuimpish*
VinoUbuntujammy*
VinoUbuntukinetic*
VinoUbuntulunar*
VinoUbuntumantic*
VinoUbuntunoble*
VinoUbuntuoracular*
VinoUbuntuplucky*
VinoUbuntuquesting*
VinoUbuntutrusty*
VinoUbuntuxenial*

References