Date: Wed, 8 Feb 2023 02:32:03 GMT From: Koichiro Iwao <meta@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 61cd6326134c - main - security/vuxml: Document TightVNC multiplevulnerability Message-ID: <202302080232.3182W3dG080843@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by meta: URL: https://cgit.FreeBSD.org/ports/commit/?id=61cd6326134cafd47e1c9273d01af3afe69f2921 commit 61cd6326134cafd47e1c9273d01af3afe69f2921 Author: Koichiro Iwao <meta@FreeBSD.org> AuthorDate: 2023-02-08 02:28:52 +0000 Commit: Koichiro Iwao <meta@FreeBSD.org> CommitDate: 2023-02-08 02:29:38 +0000 security/vuxml: Document TightVNC multiplevulnerability --- security/vuxml/vuln/2023.xml | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index f5afecca995b..90b6b75e2d17 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,44 @@ + <vuln vid="b34c1947-a749-11ed-b24b-1c61b4739ac9"> + <topic>TightVNC -- Muliple Vulnerabilities</topic> + <affects> + <package> + <name>tightvnc</name> + <range><le>1.3.10</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>MITRE reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8287"> + <p>TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.</p> + </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15678"> + <p>TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.</p> + </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15679"> + <p>TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.</p> + </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15680"> + <p>TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-8287</cvename> + <cvename>CVE-2019-15678</cvename> + <cvename>CVE-2019-15679</cvename> + <cvename>CVE-2019-15680</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8287</url> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15678</url> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15679</url> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15680</url> + </references> + <dates> + <discovery>2019-02-12</discovery> + <entry>2023-02-08</entry> + </dates> + </vuln> + <vuln vid="648a432c-a71f-11ed-86e9-d4c9ef517024"> <topic>OpenSSL -- Multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202302080232.3182W3dG080843>