Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-15691


TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.


Published

2019-12-26T15:15:11.007

Last Modified

2024-11-21T04:29:16.087

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-825
  • Type: Primary
    CWE-672

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tigervnc tigervnc < 1.10.1 Yes
Operating System opensuse leap 15.1 Yes

References