CVE Vulnerabilities

CVE-2019-15680

NULL Pointer Dereference

Published: Oct 29, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
TightvncTightvnc1.3.10 (including)1.3.10 (including)
LibvncserverUbuntubionic*
LibvncserverUbuntudisco*
LibvncserverUbuntueoan*
LibvncserverUbuntuesm-infra/bionic*
LibvncserverUbuntuesm-infra/focal*
LibvncserverUbuntuesm-infra/xenial*
LibvncserverUbuntufocal*
LibvncserverUbuntutrusty*
LibvncserverUbuntuxenial*
SsvncUbuntubionic*
SsvncUbuntudisco*
SsvncUbuntueoan*
SsvncUbuntufocal*
SsvncUbuntugroovy*
SsvncUbuntuhirsute*
SsvncUbuntuimpish*
SsvncUbuntukinetic*
SsvncUbuntulunar*
SsvncUbuntumantic*
SsvncUbuntuoracular*
SsvncUbuntuplucky*
SsvncUbuntutrusty*
SsvncUbuntuxenial*
TightvncUbuntubionic*
TightvncUbuntudisco*
TightvncUbuntueoan*
TightvncUbuntuesm-infra-legacy/trusty*
TightvncUbuntufocal*
TightvncUbuntugroovy*
TightvncUbuntuhirsute*
TightvncUbuntuimpish*
TightvncUbuntukinetic*
TightvncUbuntulunar*
TightvncUbuntumantic*
TightvncUbuntuoracular*
TightvncUbuntuplucky*
TightvncUbuntutrusty*
TightvncUbuntutrusty/esm*
TightvncUbuntuxenial*
VeyonUbuntudisco*
VeyonUbuntueoan*
VeyonUbuntufocal*
VeyonUbuntugroovy*
VeyonUbuntuhirsute*
VeyonUbuntuimpish*
VeyonUbuntukinetic*
VeyonUbuntulunar*
VeyonUbuntumantic*
VeyonUbuntuoracular*
VeyonUbuntuplucky*
VeyonUbuntutrusty*
VncsnapshotUbuntubionic*
VncsnapshotUbuntudisco*
VncsnapshotUbuntueoan*
VncsnapshotUbuntufocal*
VncsnapshotUbuntugroovy*
VncsnapshotUbuntuhirsute*
VncsnapshotUbuntuimpish*
VncsnapshotUbuntukinetic*
VncsnapshotUbuntulunar*
VncsnapshotUbuntumantic*
VncsnapshotUbuntuoracular*
VncsnapshotUbuntuplucky*
VncsnapshotUbuntutrusty*
VncsnapshotUbuntuxenial*
X11vncUbuntubionic*
X11vncUbuntudisco*
X11vncUbuntueoan*
X11vncUbuntufocal*
X11vncUbuntugroovy*
X11vncUbuntuhirsute*
X11vncUbuntuimpish*
X11vncUbuntukinetic*
X11vncUbuntulunar*
X11vncUbuntumantic*
X11vncUbuntutrusty*
X11vncUbuntutrusty/esm*
X11vncUbuntuxenial*

Potential Mitigations

References