CVE Vulnerabilities

CVE-2019-15690

This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.

This page will reflect the classification results once they are available through NVD.

Any vendor information available is shown as below.

Ubuntu

heap buffer overflow in libvncclient/cursor.c related to large cursor sizes when connected to a malicious server

Affected Software List

Name Vendor Version
Libvncserver Ubuntu/xenial 0.9.10+dfsg-3ubuntu0.16.04.4
Libvncserver Ubuntu/esm-infra/xenial 0.9.10+dfsg-3ubuntu0.16.04.4
Libvncserver Ubuntu/focal 0.9.12+dfsg-9ubuntu0.1
Libvncserver Ubuntu/upstream TBD
Libvncserver Ubuntu/eoan 0.9.11+dfsg-1.3ubuntu0.1
Libvncserver Ubuntu/esm-infra/bionic 0.9.11+dfsg-1ubuntu1.2
Libvncserver Ubuntu/trusty end of standard support
Libvncserver Ubuntu/bionic 0.9.11+dfsg-1ubuntu1.2
X11vnc Ubuntu/trusty end of standard support
X11vnc Ubuntu/bionic end of standard support, was needed
X11vnc Ubuntu/focal
X11vnc Ubuntu/groovy end of life
X11vnc Ubuntu/devel
X11vnc Ubuntu/esm-apps/jammy
X11vnc Ubuntu/hirsute end of life
X11vnc Ubuntu/jammy
X11vnc Ubuntu/lunar
X11vnc Ubuntu/mantic
X11vnc Ubuntu/eoan end of life
X11vnc Ubuntu/esm-apps/bionic
X11vnc Ubuntu/esm-apps/focal
X11vnc Ubuntu/esm-apps/xenial
X11vnc Ubuntu/trusty/esm
X11vnc Ubuntu/impish end of life
X11vnc Ubuntu/kinetic end of life, was needed
X11vnc Ubuntu/upstream TBD
X11vnc Ubuntu/xenial end of standard support, was needed