Learn about CVE-2019-15695, a critical stack buffer overflow vulnerability in TigerVNC versions before 1.10.1, enabling remote code execution. Find mitigation steps and update information here.
TigerVNC version 1.10.0 is vulnerable to a stack buffer overflow issue that can lead to remote code execution.
Understanding CVE-2019-15695
This CVE involves a critical vulnerability in TigerVNC versions prior to 1.10.1, allowing remote attackers to exploit a stack buffer overflow.
What is CVE-2019-15695?
The vulnerability arises from inadequate sanitization of the PixelFormat in the CMsgReader::readSetCursor function, enabling attackers to write their own values by selecting an offset in the buffer.
The Impact of CVE-2019-15695
Exploiting this vulnerability could result in remote code execution, posing a significant security risk to affected systems.
Technical Details of CVE-2019-15695
TigerVNC version 1.10.0 is susceptible to a stack buffer overflow vulnerability with the following details:
Vulnerability Description
The vulnerability allows remote attackers to trigger a stack buffer overflow by manipulating the PixelFormat in the CMsgReader::readSetCursor function.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2019-15695, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates