#VU22957 Memory leak in LibVNCServer


Published: 2019-11-25 | Updated: 2020-06-30

Vulnerability identifier: #VU22957

Vulnerability risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-15681

CWE-ID: CWE-401

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
LibVNCServer
Server applications / Remote management servers, RDP, SSH

Vendor: LibVNC

Description
The vulnerability allows a remote attacker to gain access to sensitive information on the target system.

The vulnerability exists due memory leak in VNC server code. A remote attacker can read stack memory and disclose sensitive information.

Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR.

Mitigation
Install update from vendor's website.

Vulnerable software versions

LibVNCServer: 0.9.0 - 0.9.12


External links
http://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a
http://ics-cert.kaspersky.com/reports/2019/11/22/vnc-vulnerability-research/
http://lists.debian.org/debian-lts-announce/2019/10/msg00039.html
http://lists.debian.org/debian-lts-announce/2019/10/msg00042.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability