The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
{
"binaries": [
{
"binary_version": "0.9.9+dfsg-1ubuntu1.1",
"binary_name": "libvncserver-config"
},
{
"binary_version": "0.9.9+dfsg-1ubuntu1.1",
"binary_name": "libvncserver-dev"
},
{
"binary_version": "0.9.9+dfsg-1ubuntu1.1",
"binary_name": "libvncserver0"
},
{
"binary_version": "0.9.9+dfsg-1ubuntu1.1",
"binary_name": "linuxvnc"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "1:2.0.2+dfsg1-4ubuntu0.1",
"binary_name": "italc-client"
},
{
"binary_version": "1:2.0.2+dfsg1-4ubuntu0.1",
"binary_name": "italc-management-console"
},
{
"binary_version": "1:2.0.2+dfsg1-4ubuntu0.1",
"binary_name": "italc-master"
},
{
"binary_version": "1:2.0.2+dfsg1-4ubuntu0.1",
"binary_name": "libitalccore"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1",
"binary_name": "tightvncserver"
},
{
"binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1",
"binary_name": "xtightvncviewer"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}