TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "tightvncserver",
"binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1"
},
{
"binary_name": "xtightvncviewer",
"binary_version": "1.3.9-6.5+deb8u1build0.14.04.1~esm1"
}
]
}