CVE Vulnerabilities

CVE-2019-15680

NULL Pointer Dereference

Published: Oct 29, 2019 | Modified: Dec 09, 2020
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW

TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Tightvnc Tightvnc 1.3.10 (including) 1.3.10 (including)
Libvncserver Ubuntu bionic *
Libvncserver Ubuntu disco *
Libvncserver Ubuntu eoan *
Libvncserver Ubuntu focal *
Libvncserver Ubuntu trusty *
Libvncserver Ubuntu xenial *
Ssvnc Ubuntu bionic *
Ssvnc Ubuntu disco *
Ssvnc Ubuntu eoan *
Ssvnc Ubuntu groovy *
Ssvnc Ubuntu hirsute *
Ssvnc Ubuntu impish *
Ssvnc Ubuntu kinetic *
Ssvnc Ubuntu lunar *
Ssvnc Ubuntu mantic *
Ssvnc Ubuntu trusty *
Ssvnc Ubuntu xenial *
Tightvnc Ubuntu bionic *
Tightvnc Ubuntu disco *
Tightvnc Ubuntu eoan *
Tightvnc Ubuntu groovy *
Tightvnc Ubuntu hirsute *
Tightvnc Ubuntu impish *
Tightvnc Ubuntu kinetic *
Tightvnc Ubuntu lunar *
Tightvnc Ubuntu mantic *
Tightvnc Ubuntu trusty *
Tightvnc Ubuntu trusty/esm *
Tightvnc Ubuntu xenial *
Veyon Ubuntu disco *
Veyon Ubuntu eoan *
Veyon Ubuntu groovy *
Veyon Ubuntu hirsute *
Veyon Ubuntu impish *
Veyon Ubuntu kinetic *
Veyon Ubuntu lunar *
Veyon Ubuntu mantic *
Veyon Ubuntu trusty *
Vncsnapshot Ubuntu bionic *
Vncsnapshot Ubuntu disco *
Vncsnapshot Ubuntu eoan *
Vncsnapshot Ubuntu groovy *
Vncsnapshot Ubuntu hirsute *
Vncsnapshot Ubuntu impish *
Vncsnapshot Ubuntu kinetic *
Vncsnapshot Ubuntu lunar *
Vncsnapshot Ubuntu mantic *
Vncsnapshot Ubuntu trusty *
Vncsnapshot Ubuntu xenial *
X11vnc Ubuntu bionic *
X11vnc Ubuntu disco *
X11vnc Ubuntu eoan *
X11vnc Ubuntu groovy *
X11vnc Ubuntu hirsute *
X11vnc Ubuntu impish *
X11vnc Ubuntu kinetic *
X11vnc Ubuntu lunar *
X11vnc Ubuntu mantic *
X11vnc Ubuntu trusty *
X11vnc Ubuntu trusty/esm *
X11vnc Ubuntu xenial *

Potential Mitigations

References