SUSE-SU-2019:14235-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-201914235-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:14235-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2019:14235-1
Related
Published
2019-11-29T13:46:58Z
Modified
2019-11-29T13:46:58Z
Summary
Security update for tightvnc
Details

This update for tightvnc fixes the following issues:

  • CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection which might lead to code execution (bsc#1155476).
  • CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which might lead to code execution (bsc#1155472).
  • CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which could have led to denial of service (bsc#1155452).
  • CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler (bsc#1155442).
References

Affected packages

SUSE:Linux Enterprise Point of Sale 11 SP3 / tightvnc

Package

Name
tightvnc
Purl
pkg:rpm/suse/tightvnc&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.9-81.15.3.1

Ecosystem specific

{
    "binaries": [
        {
            "tightvnc": "1.3.9-81.15.3.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / tightvnc

Package

Name
tightvnc
Purl
pkg:rpm/suse/tightvnc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.9-81.15.3.1

Ecosystem specific

{
    "binaries": [
        {
            "tightvnc": "1.3.9-81.15.3.1"
        }
    ]
}