cve_id
stringlengths
13
16
obtain_all_privilege
stringclasses
3 values
obtain_user_privilege
stringclasses
2 values
obtain_other_privilege
stringclasses
2 values
user_interaction_required
stringclasses
3 values
cvss2_vector_string
stringclasses
106 values
cvss2_access_vector
stringclasses
4 values
cvss2_access_complexity
stringclasses
4 values
cvss2_authentication
stringclasses
3 values
cvss2_confidentiality_impact
stringclasses
4 values
cvss2_integrity_impact
stringclasses
4 values
cvss2_availability_impact
stringclasses
4 values
cvss2_base_score
stringclasses
50 values
cvss3_vector_string
stringclasses
226 values
cvss3_attack_vector
stringclasses
5 values
cvss3_attack_complexity
stringclasses
3 values
cvss3_privileges_required
stringclasses
4 values
cvss3_user_interaction
stringclasses
3 values
cvss3_scope
stringclasses
3 values
cvss3_confidentiality_impact
stringclasses
4 values
cvss3_integrity_impact
stringclasses
4 values
cvss3_availability_impact
stringclasses
4 values
cvss3_base_score
stringclasses
55 values
cvss3_base_severity
stringclasses
5 values
exploitability_score
stringclasses
22 values
impact_score
stringclasses
15 values
ac_insuf_info
stringclasses
3 values
reference_json
stringlengths
221
23.3k
problemtype_json
stringclasses
200 values
severity
stringclasses
4 values
cve_nodes
stringlengths
2
33.1k
cve_description
stringlengths
64
1.99k
cve_last_modified_date
stringlengths
17
17
cve_published_date
stringlengths
17
17
cwe_name
stringclasses
125 values
cwe_description
stringclasses
124 values
cwe_extended_description
stringclasses
95 values
cwe_url
stringclasses
124 values
cwe_is_category
int64
0
1
commit_author
stringlengths
0
34
commit_author_date
stringlengths
25
25
commit_msg
stringlengths
0
13.3k
commit_hash
stringlengths
40
40
commit_is_merge
stringclasses
1 value
repo_name
stringclasses
467 values
repo_description
stringclasses
459 values
repo_date_created
stringclasses
467 values
repo_date_last_push
stringclasses
467 values
repo_homepage
stringclasses
294 values
repo_owner
stringclasses
470 values
repo_stars
stringclasses
406 values
repo_forks
stringclasses
352 values
function_name
stringlengths
3
120
function_signature
stringlengths
6
640
function_parameters
stringlengths
2
302
function
stringlengths
12
114k
function_token_count
stringlengths
1
5
function_before_change
stringclasses
1 value
labels
int64
1
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Extensions::TransportSockets::Tls::TEST_P
Envoy::Extensions::TransportSockets::Tls::TEST_P( SslSocketTest , Ipv6San)
['SslSocketTest', 'Ipv6San']
TEST_P(SslSocketTest, Ipv6San) { const std::string client_ctx_yaml = R"EOF( common_tls_context: validation_context: trusted_ca: filename: "{{ test_rundir }}/test/config/integration/certs/upstreamcacert.pem" match_subject_alt_names: exact: "::1" )EOF"; const std::string server_ctx_yaml = R"EOF( common_tls_context: tls_certificates: certificate_chain: filename: "{{ test_rundir }}/test/config/integration/certs/upstreamlocalhostcert.pem" private_key: filename: "{{ test_rundir }}/test/config/integration/certs/upstreamlocalhostkey.pem" )EOF"; TestUtilOptions test_options(client_ctx_yaml, server_ctx_yaml, true, GetParam()); testUtil(test_options); }
102
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::AdsIntegrationTest::initializeAds
Envoy::AdsIntegrationTest::initializeAds( const bool rate_limiting)
['rate_limiting']
void AdsIntegrationTest::initializeAds(const bool rate_limiting) { config_helper_.addRuntimeOverride("envoy.restart_features.explicit_wildcard_resource", oldDssOrNewDss() == OldDssOrNewDss::Old ? "false" : "true"); config_helper_.addConfigModifier([this, &rate_limiting]( envoy::config::bootstrap::v3::Bootstrap& bootstrap) { auto* ads_config = bootstrap.mutable_dynamic_resources()->mutable_ads_config(); if (rate_limiting) { ads_config->mutable_rate_limit_settings(); } auto* grpc_service = ads_config->add_grpc_services(); setGrpcService(*grpc_service, "ads_cluster", xds_upstream_->localAddress()); auto* ads_cluster = bootstrap.mutable_static_resources()->add_clusters(); ads_cluster->MergeFrom(bootstrap.static_resources().clusters()[0]); ads_cluster->set_name("ads_cluster"); envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext context; auto* validation_context = context.mutable_common_tls_context()->mutable_validation_context(); validation_context->mutable_trusted_ca()->set_filename( TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcacert.pem")); validation_context->add_match_subject_alt_names()->set_suffix("lyft.com"); if (clientType() == Grpc::ClientType::GoogleGrpc) { auto* google_grpc = grpc_service->mutable_google_grpc(); auto* ssl_creds = google_grpc->mutable_channel_credentials()->mutable_ssl_credentials(); ssl_creds->mutable_root_certs()->set_filename( TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcacert.pem")); } ads_cluster->mutable_transport_socket()->set_name("envoy.transport_sockets.tls"); ads_cluster->mutable_transport_socket()->mutable_typed_config()->PackFrom(context); }); HttpIntegrationTest::initialize(); if (xds_stream_ == nullptr) { createXdsConnection(); AssertionResult result = xds_connection_->waitForNewStream(*dispatcher_, xds_stream_); RELEASE_ASSERT(result, result.message()); xds_stream_->startGrpcStream(); } }
327
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Ssl::initializeUpstreamTlsContextConfig
Envoy::Ssl::initializeUpstreamTlsContextConfig( const ClientSslTransportOptions & options , envoy :: extensions :: transport_sockets :: tls :: v3 :: UpstreamTlsContext & tls_context)
['options', 'tls_context']
void initializeUpstreamTlsContextConfig( const ClientSslTransportOptions& options, envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext& tls_context) { std::string yaml_plain = R"EOF( common_tls_context: validation_context: trusted_ca: filename: "{{ test_rundir }}/test/config/integration/certs/cacert.pem" )EOF"; if (options.client_ecdsa_cert_) { yaml_plain += R"EOF( tls_certificates: certificate_chain: filename: "{{ test_rundir }}/test/config/integration/certs/client_ecdsacert.pem" private_key: filename: "{{ test_rundir }}/test/config/integration/certs/client_ecdsakey.pem" )EOF"; } else if (options.use_expired_spiffe_cert_) { yaml_plain += R"EOF( tls_certificates: certificate_chain: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/expired_spiffe_san_cert.pem" private_key: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/expired_spiffe_san_key.pem" )EOF"; } else { yaml_plain += R"EOF( tls_certificates: certificate_chain: filename: "{{ test_rundir }}/test/config/integration/certs/clientcert.pem" private_key: filename: "{{ test_rundir }}/test/config/integration/certs/clientkey.pem" )EOF"; } TestUtility::loadFromYaml(TestEnvironment::substitute(yaml_plain), tls_context); auto* common_context = tls_context.mutable_common_tls_context(); if (options.alpn_) { common_context->add_alpn_protocols(Http::Utility::AlpnNames::get().Http2); common_context->add_alpn_protocols(Http::Utility::AlpnNames::get().Http11); common_context->add_alpn_protocols(Http::Utility::AlpnNames::get().Http3); } if (!options.san_.empty()) { common_context->mutable_validation_context()->add_match_subject_alt_names()->set_exact( options.san_); } for (const std::string& cipher_suite : options.cipher_suites_) { common_context->mutable_tls_params()->add_cipher_suites(cipher_suite); } if (!options.sni_.empty()) { tls_context.set_sni(options.sni_); } common_context->mutable_tls_params()->set_tls_minimum_protocol_version(options.tls_version_); common_context->mutable_tls_params()->set_tls_maximum_protocol_version(options.tls_version_); }
383
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Xfcc::XfccIntegrationTest::createClientSslContext
Envoy::Xfcc::XfccIntegrationTest::createClientSslContext( bool mtls)
['mtls']
Network::TransportSocketFactoryPtr XfccIntegrationTest::createClientSslContext(bool mtls) { const std::string yaml_tls = R"EOF( common_tls_context: validation_context: trusted_ca: filename: {{ test_rundir }}/test/config/integration/certs/cacert.pem match_subject_alt_names: exact: "spiffe://lyft.com/backend-team" exact: "lyft.com" exact: "www.lyft.com" )EOF"; const std::string yaml_mtls = R"EOF( common_tls_context: validation_context: trusted_ca: filename: {{ test_rundir }}/test/config/integration/certs/cacert.pem match_subject_alt_names: exact: "spiffe://lyft.com/backend-team" exact: "lyft.com" exact: "www.lyft.com" tls_certificates: certificate_chain: filename: {{ test_rundir }}/test/config/integration/certs/clientcert.pem private_key: filename: {{ test_rundir }}/test/config/integration/certs/clientkey.pem )EOF"; std::string target; if (mtls) { target = yaml_mtls; } else { target = yaml_tls; } envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext config; TestUtility::loadFromYaml(TestEnvironment::substitute(target), config); auto cfg = std::make_unique<Extensions::TransportSockets::Tls::ClientContextConfigImpl>( config, factory_context_); static auto* client_stats_store = new Stats::TestIsolatedStoreImpl(); return Network::TransportSocketFactoryPtr{ new Extensions::TransportSockets::Tls::ClientSslSocketFactory( std::move(cfg), *context_manager_, *client_stats_store)}; } Network::TransportSocketFactoryPtr XfccIntegrationTest::createUpstreamSslContext() { envoy::extensions::transport_sockets::tls::v3::DownstreamTlsContext tls_context; auto* common_tls_context = tls_context.mutable_common_tls_context(); auto* tls_cert = common_tls_context->add_tls_certificates(); tls_cert->mutable_certificate_chain()->set_filename( TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcert.pem")); tls_cert->mutable_private_key()->set_filename( TestEnvironment::runfilesPath("test/config/integration/certs/upstreamkey.pem")); auto cfg = std::make_unique<Extensions::TransportSockets::Tls::ServerContextConfigImpl>( tls_context, factory_context_); static Stats::Scope* upstream_stats_store = new Stats::TestIsolatedStoreImpl(); return std::make_unique<Extensions::TransportSockets::Tls::ServerSslSocketFactory>( std::move(cfg), *context_manager_, *upstream_stats_store, std::vector<std::string>{}); } Network::ClientConnectionPtr XfccIntegrationTest::makeTcpClientConnection() { Network::Address::InstanceConstSharedPtr address = Network::Utility::resolveUrl("tcp://" + Network::Test::getLoopbackAddressUrlString(version_) + ":" + std::to_string(lookupPort("http"))); return dispatcher_->createClientConnection(address, Network::Address::InstanceConstSharedPtr(), Network::Test::createRawBufferSocket(), nullptr); }
178
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Xfcc::XfccIntegrationTest::initialize
Envoy::Xfcc::XfccIntegrationTest::initialize()
[]
void XfccIntegrationTest::initialize() { config_helper_.addConfigModifier( [&](envoy::extensions::filters::network::http_connection_manager::v3::HttpConnectionManager& hcm) -> void { hcm.set_forward_client_cert_details(fcc_); hcm.mutable_set_current_client_cert_details()->CopyFrom(sccd_); }); config_helper_.addConfigModifier([&](envoy::config::bootstrap::v3::Bootstrap& bootstrap) -> void { auto transport_socket = bootstrap.mutable_static_resources()->mutable_clusters(0)->mutable_transport_socket(); envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext context; auto* validation_context = context.mutable_common_tls_context()->mutable_validation_context(); validation_context->mutable_trusted_ca()->set_filename( TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcacert.pem")); validation_context->add_match_subject_alt_names()->set_suffix("lyft.com"); transport_socket->set_name("envoy.transport_sockets.tls"); transport_socket->mutable_typed_config()->PackFrom(context); }); if (tls_) { config_helper_.addSslConfig(); } context_manager_ = std::make_unique<Extensions::TransportSockets::Tls::ContextManagerImpl>(timeSystem()); client_tls_ssl_ctx_ = createClientSslContext(false); client_mtls_ssl_ctx_ = createClientSslContext(true); HttpIntegrationTest::initialize(); }
223
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Server::TEST_F
Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryAndSslContext)
['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryAndSslContext']
TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryAndSslContext) { const std::string yaml = TestEnvironment::substitute(R"EOF( address: socket_address: address: 127.0.0.1 protocol: UDP port_value: 1234 filter_chains: - filter_chain_match: transport_protocol: "quic" filters: - name: envoy.filters.network.http_connection_manager typed_config: "@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager codec_type: HTTP3 stat_prefix: hcm route_config: name: local_route http_filters: - name: envoy.filters.http.router transport_socket: name: envoy.transport_sockets.quic typed_config: "@type": type.googleapis.com/envoy.extensions.transport_sockets.quic.v3.QuicDownstreamTransport downstream_tls_context: common_tls_context: tls_certificates: - certificate_chain: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem" private_key: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem" validation_context: trusted_ca: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem" match_subject_alt_names: - exact: localhost - exact: 127.0.0.1 udp_listener_config: quic_options: {} )EOF", Network::Address::IpVersion::v4); envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml); ON_CALL(udp_gso_syscall_, supportsUdpGso()) .WillByDefault(Return(os_sys_calls_actual_.supportsUdpGso())); EXPECT_CALL(server_.api_.random_, uuid()); expectCreateListenSocket(envoy::config::core::v3::SocketOption::STATE_PREBIND, #ifdef SO_RXQ_OVFL // SO_REUSEPORT is on as configured /* expected_num_options */ Api::OsSysCallsSingleton::get().supportsUdpGro() ? 4 : 3, #else /* expected_num_options */ Api::OsSysCallsSingleton::get().supportsUdpGro() ? 3 : 2, #endif ListenerComponentFactory::BindType::ReusePort); expectSetsockopt(/* expected_sockopt_level */ IPPROTO_IP, /* expected_sockopt_name */ ENVOY_IP_PKTINFO, /* expected_value */ 1, /* expected_num_calls */ 1); #ifdef SO_RXQ_OVFL expectSetsockopt(/* expected_sockopt_level */ SOL_SOCKET, /* expected_sockopt_name */ SO_RXQ_OVFL, /* expected_value */ 1, /* expected_num_calls */ 1); #endif expectSetsockopt(/* expected_sockopt_level */ SOL_SOCKET, /* expected_sockopt_name */ SO_REUSEPORT, /* expected_value */ 1, /* expected_num_calls */ 1); #ifdef UDP_GRO if (Api::OsSysCallsSingleton::get().supportsUdpGro()) { expectSetsockopt(/* expected_sockopt_level */ SOL_UDP, /* expected_sockopt_name */ UDP_GRO, /* expected_value */ 1, /* expected_num_calls */ 1); } #endif manager_->addOrUpdateListener(listener_proto, "", true); EXPECT_EQ(1u, manager_->listeners().size()); EXPECT_FALSE(manager_->listeners()[0] .get() .udpListenerConfig() ->listenerFactory() .isTransportConnectionless()); Network::SocketSharedPtr listen_socket = manager_->listeners().front().get().listenSocketFactory().getListenSocket(0); Network::UdpPacketWriterPtr udp_packet_writer = manager_->listeners() .front() .get() .udpListenerConfig() ->packetWriterFactory() .createUdpPacketWriter(listen_socket->ioHandle(), manager_->listeners()[0].get().listenerScope()); EXPECT_EQ(udp_packet_writer->isBatchMode(), Api::OsSysCallsSingleton::get().supportsUdpGso()); // No filter chain found with non-matching transport protocol. EXPECT_EQ(nullptr, findFilterChain(1234, "127.0.0.1", "", "tls", {}, "8.8.8.8", 111)); auto filter_chain = findFilterChain(1234, "127.0.0.1", "", "quic", {}, "8.8.8.8", 111); ASSERT_NE(nullptr, filter_chain); auto& quic_socket_factory = dynamic_cast<const Quic::QuicServerTransportSocketFactory&>( filter_chain->transportSocketFactory()); EXPECT_TRUE(quic_socket_factory.implementsSecureTransport()); EXPECT_FALSE(quic_socket_factory.getTlsCertificates().empty()); }
510
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Server::TEST_F
Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryWithConnectionBalencer)
['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryWithConnectionBalencer']
TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryWithConnectionBalencer) { const std::string yaml = TestEnvironment::substitute(R"EOF( address: socket_address: address: 127.0.0.1 protocol: UDP port_value: 1234 filter_chains: - filter_chain_match: transport_protocol: "quic" filters: - name: envoy.filters.network.http_connection_manager typed_config: "@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager codec_type: HTTP3 stat_prefix: hcm route_config: name: local_route http_filters: - name: envoy.filters.http.router transport_socket: name: envoy.transport_sockets.quic typed_config: "@type": type.googleapis.com/envoy.extensions.transport_sockets.quic.v3.QuicDownstreamTransport downstream_tls_context: common_tls_context: tls_certificates: - certificate_chain: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem" private_key: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem" validation_context: trusted_ca: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem" match_subject_alt_names: - exact: localhost - exact: 127.0.0.1 udp_listener_config: quic_options: {} connection_balance_config: exact_balance: {} )EOF", Network::Address::IpVersion::v4); envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml); #if defined(ENVOY_ENABLE_QUIC) EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException, "connection_balance_config is configured for QUIC listener which doesn't " "work with connection balancer."); #else EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException, "QUIC is configured but not enabled in the build."); #endif }
151
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Server::TEST_F
Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryWithWrongCodec)
['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryWithWrongCodec']
TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryWithWrongCodec) { const std::string yaml = TestEnvironment::substitute(R"EOF( address: socket_address: address: 127.0.0.1 protocol: UDP port_value: 1234 filter_chains: - filter_chain_match: transport_protocol: "quic" filters: [] transport_socket: name: envoy.transport_sockets.quic typed_config: "@type": type.googleapis.com/envoy.extensions.transport_sockets.quic.v3.QuicDownstreamTransport downstream_tls_context: common_tls_context: tls_certificates: - certificate_chain: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem" private_key: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem" validation_context: trusted_ca: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem" match_subject_alt_names: - exact: localhost - exact: 127.0.0.1 udp_listener_config: quic_options: {} )EOF", Network::Address::IpVersion::v4); envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml); #if defined(ENVOY_ENABLE_QUIC) EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException, "error building network filter chain for quic listener: requires exactly " "one http_connection_manager filter."); #else EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException, "QUIC is configured but not enabled in the build."); #endif }
148
True
1
CVE-2022-21656
False
False
False
False
AV:N/AC:M/Au:N/C:P/I:P/A:N
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
NONE
5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
NETWORK
HIGH
NONE
NONE
UNCHANGED
NONE
HIGH
NONE
5.9
MEDIUM
2.2
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-295'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}]
2022-03-02T14:56Z
2022-02-22T23:15Z
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate.
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
https://cwe.mitre.org/data/definitions/295.html
0
pradeepcrao
2021-11-24 14:28:02+00:00
Specify type for matching Subject Alternative Name. (#18628) Signed-off-by: Pradeep Rao <[email protected]>
bb95af848c939cfe5b5ee33c5b1770558077e64e
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Server::TEST_F
Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryWithWrongTransportSocket)
['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryWithWrongTransportSocket']
TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryWithWrongTransportSocket) { const std::string yaml = TestEnvironment::substitute(R"EOF( address: socket_address: address: 127.0.0.1 protocol: UDP port_value: 1234 filter_chains: - filter_chain_match: transport_protocol: "quic" filters: [] transport_socket: name: envoy.transport_sockets.quic typed_config: "@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext common_tls_context: tls_certificates: - certificate_chain: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem" private_key: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem" validation_context: trusted_ca: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem" match_subject_alt_names: - exact: localhost - exact: 127.0.0.1 udp_listener_config: quic_options: {} )EOF", Network::Address::IpVersion::v4); envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml); #if defined(ENVOY_ENABLE_QUIC) EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException, "wrong transport socket config specified for quic transport socket"); #else EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException, "QUIC is configured but not enabled in the build."); #endif }
147
True
1
CVE-2022-23606
False
False
False
False
AV:N/AC:L/Au:S/C:N/I:N/A:P
NETWORK
LOW
SINGLE
NONE
NONE
PARTIAL
4.0
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
LOW
NONE
UNCHANGED
NONE
NONE
HIGH
6.5
MEDIUM
2.8
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-674'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}]
2022-03-02T14:37Z
2022-02-22T23:15Z
Uncontrolled Recursion
The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
https://cwe.mitre.org/data/definitions/674.html
0
Yan Avlasov
2022-02-01 19:33:02+00:00
CVE-2022-23606 Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed. Signed-off-by: Yan Avlasov <[email protected]>
4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::ConnectionPool::ConnPoolImplBase::checkForIdleAndCloseIdleConnsIfDraining
Envoy::ConnectionPool::ConnPoolImplBase::checkForIdleAndCloseIdleConnsIfDraining()
[]
void ConnPoolImplBase::checkForIdleAndCloseIdleConnsIfDraining() { if (is_draining_for_deletion_) { closeIdleConnectionsForDrainingPool(); } if (isIdleImpl()) { ENVOY_LOG(debug, "invoking idle callbacks - is_draining_for_deletion_={}", is_draining_for_deletion_); for (const Instance::IdleCb& cb : idle_callbacks_) { cb(); } } }
51
True
1
CVE-2022-23606
False
False
False
False
AV:N/AC:L/Au:S/C:N/I:N/A:P
NETWORK
LOW
SINGLE
NONE
NONE
PARTIAL
4.0
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
LOW
NONE
UNCHANGED
NONE
NONE
HIGH
6.5
MEDIUM
2.8
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-674'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}]
2022-03-02T14:37Z
2022-02-22T23:15Z
Uncontrolled Recursion
The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
https://cwe.mitre.org/data/definitions/674.html
0
Yan Avlasov
2022-02-01 19:33:02+00:00
CVE-2022-23606 Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed. Signed-off-by: Yan Avlasov <[email protected]>
4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::ConnectionPool::ConnPoolImplBase::onConnectionEvent
Envoy::ConnectionPool::ConnPoolImplBase::onConnectionEvent( ActiveClient & client , absl :: string_view failure_reason , Network :: ConnectionEvent event)
['client', 'failure_reason', 'event']
void ConnPoolImplBase::onConnectionEvent(ActiveClient& client, absl::string_view failure_reason, Network::ConnectionEvent event) { if (client.state() == ActiveClient::State::CONNECTING) { ASSERT(connecting_stream_capacity_ >= client.effectiveConcurrentStreamLimit()); connecting_stream_capacity_ -= client.effectiveConcurrentStreamLimit(); } if (client.connect_timer_) { client.connect_timer_->disableTimer(); client.connect_timer_.reset(); } if (event == Network::ConnectionEvent::RemoteClose || event == Network::ConnectionEvent::LocalClose) { state_.decrConnectingAndConnectedStreamCapacity(client.currentUnusedCapacity()); // Make sure that onStreamClosed won't double count. client.remaining_streams_ = 0; // The client died. ENVOY_CONN_LOG(debug, "client disconnected, failure reason: {}", client, failure_reason); Envoy::Upstream::reportUpstreamCxDestroy(host_, event); const bool incomplete_stream = client.closingWithIncompleteStream(); if (incomplete_stream) { Envoy::Upstream::reportUpstreamCxDestroyActiveRequest(host_, event); } if (client.state() == ActiveClient::State::CONNECTING) { host_->cluster().stats().upstream_cx_connect_fail_.inc(); host_->stats().cx_connect_fail_.inc(); ConnectionPool::PoolFailureReason reason; if (client.timed_out_) { reason = ConnectionPool::PoolFailureReason::Timeout; } else if (event == Network::ConnectionEvent::RemoteClose) { reason = ConnectionPool::PoolFailureReason::RemoteConnectionFailure; } else { reason = ConnectionPool::PoolFailureReason::LocalConnectionFailure; } // Raw connect failures should never happen under normal circumstances. If we have an upstream // that is behaving badly, streams can get stuck here in the pending state. If we see a // connect failure, we purge all pending streams so that calling code can determine what to // do with the stream. // NOTE: We move the existing pending streams to a temporary list. This is done so that // if retry logic submits a new stream to the pool, we don't fail it inline. purgePendingStreams(client.real_host_description_, failure_reason, reason); // See if we should preconnect based on active connections. if (!is_draining_for_deletion_) { tryCreateNewConnections(); } } // We need to release our resourceManager() resources before checking below for // whether we can create a new connection. Normally this would happen when // client's destructor runs, but this object needs to be deferredDelete'd(), so // this forces part of its cleanup to happen now. client.releaseResources(); // Again, since we know this object is going to be deferredDelete'd(), we take // this opportunity to disable and reset the connection duration timer so that // it doesn't trigger while on the deferred delete list. In theory it is safe // to handle the CLOSED state in onConnectionDurationTimeout, but we handle // it here for simplicity and safety anyway. if (client.connection_duration_timer_) { client.connection_duration_timer_->disableTimer(); client.connection_duration_timer_.reset(); } dispatcher_.deferredDelete(client.removeFromList(owningList(client.state()))); checkForIdleAndCloseIdleConnsIfDraining(); client.setState(ActiveClient::State::CLOSED); // If we have pending streams and we just lost a connection we should make a new one. if (!pending_streams_.empty()) { tryCreateNewConnections(); } } else if (event == Network::ConnectionEvent::Connected) { client.conn_connect_ms_->complete(); client.conn_connect_ms_.reset(); ASSERT(client.state() == ActiveClient::State::CONNECTING); bool streams_available = client.currentUnusedCapacity() > 0; transitionActiveClientState(client, streams_available ? ActiveClient::State::READY : ActiveClient::State::BUSY); // Now that the active client is ready, set up a timer for max connection duration. const absl::optional<std::chrono::milliseconds> max_connection_duration = client.parent_.host()->cluster().maxConnectionDuration(); if (max_connection_duration.has_value()) { client.connection_duration_timer_ = client.parent_.dispatcher().createTimer( [&client]() { client.onConnectionDurationTimeout(); }); client.connection_duration_timer_->enableTimer(max_connection_duration.value()); } // At this point, for the mixed ALPN pool, the client may be deleted. Do not // refer to client after this point. onConnected(client); if (streams_available) { onUpstreamReady(); } checkForIdleAndCloseIdleConnsIfDraining(); } }
538
True
1
CVE-2022-23606
False
False
False
False
AV:N/AC:L/Au:S/C:N/I:N/A:P
NETWORK
LOW
SINGLE
NONE
NONE
PARTIAL
4.0
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
LOW
NONE
UNCHANGED
NONE
NONE
HIGH
6.5
MEDIUM
2.8
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-674'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}]
2022-03-02T14:37Z
2022-02-22T23:15Z
Uncontrolled Recursion
The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
https://cwe.mitre.org/data/definitions/674.html
0
Yan Avlasov
2022-02-01 19:33:02+00:00
CVE-2022-23606 Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed. Signed-off-by: Yan Avlasov <[email protected]>
4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::CdsIntegrationTest::CdsIntegrationTest
Envoy::CdsIntegrationTest::CdsIntegrationTest()
[]
CdsIntegrationTest() : HttpIntegrationTest(Http::CodecType::HTTP2, ipVersion(), ConfigHelper::discoveredClustersBootstrap( sotwOrDelta() == Grpc::SotwOrDelta::Sotw || sotwOrDelta() == Grpc::SotwOrDelta::UnifiedSotw ? "GRPC" : "DELTA_GRPC")) { if (sotwOrDelta() == Grpc::SotwOrDelta::UnifiedSotw || sotwOrDelta() == Grpc::SotwOrDelta::UnifiedDelta) { config_helper_.addRuntimeOverride("envoy.reloadable_features.unified_mux", "true"); } use_lds_ = false; sotw_or_delta_ = sotwOrDelta(); }
90
True
1
CVE-2022-23606
False
False
False
False
AV:N/AC:L/Au:S/C:N/I:N/A:P
NETWORK
LOW
SINGLE
NONE
NONE
PARTIAL
4.0
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
LOW
NONE
UNCHANGED
NONE
NONE
HIGH
6.5
MEDIUM
2.8
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-674'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}]
2022-03-02T14:37Z
2022-02-22T23:15Z
Uncontrolled Recursion
The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
https://cwe.mitre.org/data/definitions/674.html
0
Yan Avlasov
2022-02-01 19:33:02+00:00
CVE-2022-23606 Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed. Signed-off-by: Yan Avlasov <[email protected]>
4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::CdsIntegrationTest::initialize
Envoy::CdsIntegrationTest::initialize()
[]
void initialize() override { use_lds_ = false; test_skipped_ = false; // Controls how many addFakeUpstream() will happen in // BaseIntegrationTest::createUpstreams() (which is part of initialize()). // Make sure this number matches the size of the 'clusters' repeated field in the bootstrap // config that you use! setUpstreamCount(1); // the CDS cluster setUpstreamProtocol(Http::CodecType::HTTP2); // CDS uses gRPC uses HTTP2. // HttpIntegrationTest::initialize() does many things: // 1) It appends to fake_upstreams_ as many as you asked for via setUpstreamCount(). // 2) It updates your bootstrap config with the ports your fake upstreams are actually listening // on (since you're supposed to leave them as 0). // 3) It creates and starts an IntegrationTestServer - the thing that wraps the almost-actual // Envoy used in the tests. // 4) Bringing up the server usually entails waiting to ensure that any listeners specified in // the bootstrap config have come up, and registering them in a port map (see lookupPort()). // However, this test needs to defer all of that to later. defer_listener_finalization_ = true; HttpIntegrationTest::initialize(); // Create the regular (i.e. not an xDS server) upstreams. We create them manually here after // initialize() because finalize() expects all fake_upstreams_ to correspond to a static // cluster in the bootstrap config - which we don't want since we're testing dynamic CDS! addFakeUpstream(Http::CodecType::HTTP2); addFakeUpstream(Http::CodecType::HTTP2); cluster1_ = ConfigHelper::buildStaticCluster( ClusterName1, fake_upstreams_[UpstreamIndex1]->localAddress()->ip()->port(), Network::Test::getLoopbackAddressString(ipVersion())); cluster2_ = ConfigHelper::buildStaticCluster( ClusterName2, fake_upstreams_[UpstreamIndex2]->localAddress()->ip()->port(), Network::Test::getLoopbackAddressString(ipVersion())); // Let Envoy establish its connection to the CDS server. acceptXdsConnection(); // Do the initial compareDiscoveryRequest / sendDiscoveryResponse for cluster_1. EXPECT_TRUE(compareDiscoveryRequest(Config::TypeUrl::get().Cluster, "", {}, {}, {}, true)); sendDiscoveryResponse<envoy::config::cluster::v3::Cluster>(Config::TypeUrl::get().Cluster, {cluster1_}, {cluster1_}, {}, "55"); // We can continue the test once we're sure that Envoy's ClusterManager has made use of // the DiscoveryResponse describing cluster_1 that we sent. // 2 because the statically specified CDS server itself counts as a cluster. test_server_->waitForGaugeGe("cluster_manager.active_clusters", 2); // Wait for our statically specified listener to become ready, and register its port in the // test framework's downstream listener port map. test_server_->waitUntilListenersReady(); registerTestServerPorts({"http"}); }
222
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::ConnectionManagerImpl::ActiveStream::encodeHeaders
Envoy::Http::ConnectionManagerImpl::ActiveStream::encodeHeaders( ResponseHeaderMap & headers , bool end_stream)
['headers', 'end_stream']
void ConnectionManagerImpl::ActiveStream::encodeHeaders(ResponseHeaderMap& headers, bool end_stream) { // Base headers. // We want to preserve the original date header, but we add a date header if it is absent if (!headers.Date()) { connection_manager_.config_.dateProvider().setDateHeader(headers); } // Following setReference() is safe because serverName() is constant for the life of the // listener. const auto transformation = connection_manager_.config_.serverHeaderTransformation(); if (transformation == ConnectionManagerConfig::HttpConnectionManagerProto::OVERWRITE || (transformation == ConnectionManagerConfig::HttpConnectionManagerProto::APPEND_IF_ABSENT && headers.Server() == nullptr)) { headers.setReferenceServer(connection_manager_.config_.serverName()); } ConnectionManagerUtility::mutateResponseHeaders( headers, request_headers_.get(), connection_manager_.config_, connection_manager_.config_.via(), filter_manager_.streamInfo(), connection_manager_.proxy_name_, connection_manager_.clear_hop_by_hop_response_headers_); bool drain_connection_due_to_overload = false; if (connection_manager_.drain_state_ == DrainState::NotDraining && connection_manager_.random_generator_.bernoulli( connection_manager_.overload_disable_keepalive_ref_.value())) { ENVOY_STREAM_LOG(debug, "disabling keepalive due to envoy overload", *this); drain_connection_due_to_overload = true; connection_manager_.stats_.named_.downstream_cx_overload_disable_keepalive_.inc(); } // See if we want to drain/close the connection. Send the go away frame prior to encoding the // header block. if (connection_manager_.drain_state_ == DrainState::NotDraining && (connection_manager_.drain_close_.drainClose() || drain_connection_due_to_overload)) { // This doesn't really do anything for HTTP/1.1 other then give the connection another boost // of time to race with incoming requests. For HTTP/2 connections, send a GOAWAY frame to // prevent any new streams. connection_manager_.startDrainSequence(); connection_manager_.stats_.named_.downstream_cx_drain_close_.inc(); ENVOY_STREAM_LOG(debug, "drain closing connection", *this); } if (connection_manager_.codec_->protocol() == Protocol::Http10) { // As HTTP/1.0 and below can not do chunked encoding, if there is no content // length the response will be framed by connection close. if (!headers.ContentLength()) { state_.saw_connection_close_ = true; } // If the request came with a keep-alive and no other factor resulted in a // connection close header, send an explicit keep-alive header. if (!state_.saw_connection_close_) { headers.setConnection(Headers::get().ConnectionValues.KeepAlive); } } if (connection_manager_.drain_state_ == DrainState::NotDraining && state_.saw_connection_close_) { ENVOY_STREAM_LOG(debug, "closing connection due to connection close header", *this); connection_manager_.drain_state_ = DrainState::Closing; } // If we are destroying a stream before remote is complete and the connection does not support // multiplexing, we should disconnect since we don't want to wait around for the request to // finish. if (!filter_manager_.remoteComplete()) { if (connection_manager_.codec_->protocol() < Protocol::Http2) { connection_manager_.drain_state_ = DrainState::Closing; } connection_manager_.stats_.named_.downstream_rq_response_before_rq_complete_.inc(); } if (connection_manager_.drain_state_ != DrainState::NotDraining && connection_manager_.codec_->protocol() < Protocol::Http2) { // If the connection manager is draining send "Connection: Close" on HTTP/1.1 connections. // Do not do this for H2 (which drains via GOAWAY) or Upgrade or CONNECT (as the // payload is no longer HTTP/1.1) if (!Utility::isUpgrade(headers) && !HeaderUtility::isConnectResponse(request_headers_.get(), *responseHeaders())) { headers.setReferenceConnection(Headers::get().ConnectionValues.Close); } } if (connection_manager_.config_.tracingConfig()) { if (connection_manager_.config_.tracingConfig()->operation_name_ == Tracing::OperationName::Ingress) { // For ingress (inbound) responses, if the request headers do not include a // decorator operation (override), and the decorated operation should be // propagated, then pass the decorator's operation name (if defined) // as a response header to enable the client service to use it in its client span. if (decorated_operation_ && state_.decorated_propagate_) { headers.setEnvoyDecoratorOperation(*decorated_operation_); } } else if (connection_manager_.config_.tracingConfig()->operation_name_ == Tracing::OperationName::Egress) { const HeaderEntry* resp_operation_override = headers.EnvoyDecoratorOperation(); // For Egress (outbound) response, if a decorator operation name has been provided, it // should be used to override the active span's operation. if (resp_operation_override) { if (!resp_operation_override->value().empty() && active_span_) { active_span_->setOperation(resp_operation_override->value().getStringView()); } // Remove header so not propagated to service. headers.removeEnvoyDecoratorOperation(); } } } chargeStats(headers); ENVOY_STREAM_LOG(debug, "encoding headers via codec (end_stream={}):\n{}", *this, end_stream, headers); // Now actually encode via the codec. filter_manager_.streamInfo().downstreamTiming().onFirstDownstreamTxByteSent( connection_manager_.time_source_); response_encoder_->encodeHeaders(headers, end_stream); }
620
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::ConnectionManagerImpl::doEndStream
Envoy::Http::ConnectionManagerImpl::doEndStream( ActiveStream & stream)
['stream']
void ConnectionManagerImpl::doEndStream(ActiveStream& stream) { // The order of what happens in this routine is important and a little complicated. We first see // if the stream needs to be reset. If it needs to be, this will end up invoking reset callbacks // and then moving the stream to the deferred destruction list. If the stream has not been reset, // we move it to the deferred deletion list here. Then, we potentially close the connection. This // must be done after deleting the stream since the stream refers to the connection and must be // deleted first. bool reset_stream = false; // If the response encoder is still associated with the stream, reset the stream. The exception // here is when Envoy "ends" the stream by calling recreateStream at which point recreateStream // explicitly nulls out response_encoder to avoid the downstream being notified of the // Envoy-internal stream instance being ended. if (stream.response_encoder_ != nullptr && (!stream.filter_manager_.remoteComplete() || !stream.state_.codec_saw_local_complete_)) { // Indicate local is complete at this point so that if we reset during a continuation, we don't // raise further data or trailers. ENVOY_STREAM_LOG(debug, "doEndStream() resetting stream", stream); // TODO(snowp): This call might not be necessary, try to clean up + remove setter function. stream.filter_manager_.setLocalComplete(); stream.state_.codec_saw_local_complete_ = true; // Per https://tools.ietf.org/html/rfc7540#section-8.3 if there was an error // with the TCP connection during a CONNECT request, it should be // communicated via CONNECT_ERROR if (requestWasConnect(stream.request_headers_, codec_->protocol()) && (stream.filter_manager_.streamInfo().hasResponseFlag( StreamInfo::ResponseFlag::UpstreamConnectionFailure) || stream.filter_manager_.streamInfo().hasResponseFlag( StreamInfo::ResponseFlag::UpstreamConnectionTermination))) { stream.response_encoder_->getStream().resetStream(StreamResetReason::ConnectError); } else { if (stream.filter_manager_.streamInfo().hasResponseFlag( StreamInfo::ResponseFlag::UpstreamProtocolError)) { stream.response_encoder_->getStream().resetStream(StreamResetReason::ProtocolError); } else { stream.response_encoder_->getStream().resetStream(StreamResetReason::LocalReset); } } reset_stream = true; } if (!reset_stream) { doDeferredStreamDestroy(stream); } if (reset_stream && codec_->protocol() < Protocol::Http2) { drain_state_ = DrainState::Closing; } // If HTTP/1.0 has no content length, it is framed by close and won't consider // the request complete until the FIN is read. Don't delay close in this case. bool http_10_sans_cl = (codec_->protocol() == Protocol::Http10) && (!stream.response_headers_ || !stream.response_headers_->ContentLength()); // We also don't delay-close in the case of HTTP/1.1 where the request is // fully read, as there's no race condition to avoid. bool connection_close = stream.state_.saw_connection_close_; bool request_complete = stream.filter_manager_.remoteComplete(); checkForDeferredClose(connection_close && (request_complete || http_10_sans_cl)); }
293
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::ActiveStreamDecoderFilter::complete
Envoy::Http::ActiveStreamDecoderFilter::complete()
[]
bool ActiveStreamDecoderFilter::complete() { return parent_.state_.remote_complete_; }
14
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::FilterManager::maybeEndDecode
Envoy::Http::FilterManager::maybeEndDecode( bool end_stream)
['end_stream']
void FilterManager::maybeEndDecode(bool end_stream) { ASSERT(!state_.remote_complete_); state_.remote_complete_ = end_stream; if (end_stream) { stream_info_.downstreamTiming().onLastDownstreamRxByteReceived(dispatcher().timeSource()); ENVOY_STREAM_LOG(debug, "request end stream", *this); } }
56
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::ActiveStreamEncoderFilter::canContinue
Envoy::Http::ActiveStreamEncoderFilter::canContinue()
[]
bool canContinue() override { return true; }
9
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::FilterManager::State::State
Envoy::Http::FilterManager::State::State()
[]
State() : remote_complete_(false), local_complete_(false), has_1xx_headers_(false), created_filter_chain_(false), is_head_request_(false), is_grpc_request_(false), non_100_response_headers_encoded_(false), under_on_local_reply_(false), decoder_filter_chain_aborted_(false), encoder_filter_chain_aborted_(false), saw_downstream_reset_(false) {}
60
True
1
CVE-2021-43825
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}]
2022-03-02T18:13Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:50:04+00:00
CVE-2021-43825 Response filter manager crash Signed-off-by: Yan Avlasov <[email protected]>
148de954ed3585d8b4298b424aa24916d0de6136
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Http::FilterManager::remoteComplete
Envoy::Http::FilterManager::remoteComplete() const
[]
bool remoteComplete() const { return state_.remote_complete_; }
11
True
1
CVE-2021-43826
False
False
False
False
AV:N/AC:M/Au:N/C:N/I:N/A:P
NETWORK
MEDIUM
NONE
NONE
NONE
PARTIAL
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/ce0ae309057a216aba031aff81c445c90c6ef145', 'name': 'https://github.com/envoyproxy/envoy/commit/ce0ae309057a216aba031aff81c445c90c6ef145', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-416'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:`upstream tunneling <envoy_v3_api_field_extensions.filters.network.tcp_proxy.v3.TcpProxy.tunneling_config>` and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. There are no workarounds for this issue. Users are advised to upgrade.'}]
2022-03-02T15:23Z
2022-02-22T23:15Z
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes: Error conditions and other exceptional circumstances. Confusion over which part of the program is responsible for freeing the memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process. If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
https://cwe.mitre.org/data/definitions/416.html
0
Yan Avlasov
2022-02-01 19:53:42+00:00
CVE-2021-43826 Signed-off-by: Yan Avlasov <[email protected]>
ce0ae309057a216aba031aff81c445c90c6ef145
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::TcpProxy::Filter::onUpstreamEvent
Envoy::TcpProxy::Filter::onUpstreamEvent( Network :: ConnectionEvent event)
['event']
void Filter::onUpstreamEvent(Network::ConnectionEvent event) { // Update the connecting flag before processing the event because we may start a new connection // attempt in initializeUpstreamConnection. bool connecting = connecting_; connecting_ = false; if (event == Network::ConnectionEvent::RemoteClose || event == Network::ConnectionEvent::LocalClose) { upstream_.reset(); disableIdleTimer(); if (connecting) { if (event == Network::ConnectionEvent::RemoteClose) { getStreamInfo().setResponseFlag(StreamInfo::ResponseFlag::UpstreamConnectionFailure); read_callbacks_->upstreamHost()->outlierDetector().putResult( Upstream::Outlier::Result::LocalOriginConnectFailed); } initializeUpstreamConnection(); } else { if (read_callbacks_->connection().state() == Network::Connection::State::Open) { read_callbacks_->connection().close(Network::ConnectionCloseType::FlushWrite); } } } }
146
True
1
CVE-2022-21655
False
False
False
False
AV:N/AC:M/Au:N/C:N/I:N/A:P
NETWORK
MEDIUM
NONE
NONE
NONE
PARTIAL
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'name': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-670'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}]
2022-03-02T14:27Z
2022-02-22T23:15Z
Always-Incorrect Control Flow Implementation
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.
https://cwe.mitre.org/data/definitions/670.html
0
Yan Avlasov
2022-02-01 19:59:31+00:00
CVE-2022-21655 Crash with direct_response Signed-off-by: Yan Avlasov <[email protected]>
177d608155ba8b11598b9bbf8240e90d8c350682
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Router::Filter::convertRequestHeadersForInternalRedirect
Envoy::Router::Filter::convertRequestHeadersForInternalRedirect( Http :: RequestHeaderMap & downstream_headers , const Http :: HeaderEntry & internal_redirect , uint64_t status_code)
['downstream_headers', 'internal_redirect', 'status_code']
bool Filter::convertRequestHeadersForInternalRedirect(Http::RequestHeaderMap& downstream_headers, const Http::HeaderEntry& internal_redirect, uint64_t status_code) { if (!downstream_headers.Path()) { ENVOY_STREAM_LOG(trace, "Internal redirect failed: no path in downstream_headers", *callbacks_); return false; } absl::string_view redirect_url = internal_redirect.value().getStringView(); // Make sure the redirect response contains a URL to redirect to. if (redirect_url.empty()) { config_.stats_.passthrough_internal_redirect_bad_location_.inc(); ENVOY_STREAM_LOG(trace, "Internal redirect failed: empty location", *callbacks_); return false; } Http::Utility::Url absolute_url; if (!absolute_url.initialize(redirect_url, false)) { config_.stats_.passthrough_internal_redirect_bad_location_.inc(); ENVOY_STREAM_LOG(trace, "Internal redirect failed: invalid location {}", *callbacks_, redirect_url); return false; } const auto& policy = route_entry_->internalRedirectPolicy(); // Don't change the scheme from the original request const bool scheme_is_http = schemeIsHttp(downstream_headers, *callbacks_->connection()); const bool target_is_http = absolute_url.scheme() == Http::Headers::get().SchemeValues.Http; if (!policy.isCrossSchemeRedirectAllowed() && scheme_is_http != target_is_http) { ENVOY_STREAM_LOG(trace, "Internal redirect failed: incorrect scheme for {}", *callbacks_, redirect_url); config_.stats_.passthrough_internal_redirect_unsafe_scheme_.inc(); return false; } const StreamInfo::FilterStateSharedPtr& filter_state = callbacks_->streamInfo().filterState(); // Make sure that performing the redirect won't result in exceeding the configured number of // redirects allowed for this route. StreamInfo::UInt32Accessor* num_internal_redirect{}; if (num_internal_redirect = filter_state->getDataMutable<StreamInfo::UInt32Accessor>( NumInternalRedirectsFilterStateName); num_internal_redirect == nullptr) { auto state = std::make_shared<StreamInfo::UInt32AccessorImpl>(0); num_internal_redirect = state.get(); filter_state->setData(NumInternalRedirectsFilterStateName, std::move(state), StreamInfo::FilterState::StateType::Mutable, StreamInfo::FilterState::LifeSpan::Request); } if (num_internal_redirect->value() >= policy.maxInternalRedirects()) { ENVOY_STREAM_LOG(trace, "Internal redirect failed: redirect limits exceeded.", *callbacks_); config_.stats_.passthrough_internal_redirect_too_many_redirects_.inc(); return false; } // Copy the old values, so they can be restored if the redirect fails. const std::string original_host(downstream_headers.getHostValue()); const std::string original_path(downstream_headers.getPathValue()); const bool scheme_is_set = (downstream_headers.Scheme() != nullptr); Cleanup restore_original_headers( [&downstream_headers, original_host, original_path, scheme_is_set, scheme_is_http]() { downstream_headers.setHost(original_host); downstream_headers.setPath(original_path); if (scheme_is_set) { downstream_headers.setScheme(scheme_is_http ? Http::Headers::get().SchemeValues.Http : Http::Headers::get().SchemeValues.Https); } }); // Replace the original host, scheme and path. downstream_headers.setScheme(absolute_url.scheme()); downstream_headers.setHost(absolute_url.hostAndPort()); auto path_and_query = absolute_url.pathAndQueryParams(); if (Runtime::runtimeFeatureEnabled("envoy.reloadable_features.http_reject_path_with_fragment")) { // Envoy treats internal redirect as a new request and will reject it if URI path // contains #fragment. However the Location header is allowed to have #fragment in URI path. To // prevent Envoy from rejecting internal redirect, strip the #fragment from Location URI if it // is present. auto fragment_pos = path_and_query.find('#'); path_and_query = path_and_query.substr(0, fragment_pos); } downstream_headers.setPath(path_and_query); callbacks_->clearRouteCache(); const auto route = callbacks_->route(); // Don't allow a redirect to a non existing route. if (!route) { config_.stats_.passthrough_internal_redirect_no_route_.inc(); ENVOY_STREAM_LOG(trace, "Internal redirect failed: no route found", *callbacks_); return false; } const auto& route_name = route->routeEntry()->routeName(); for (const auto& predicate : policy.predicates()) { if (!predicate->acceptTargetRoute(*filter_state, route_name, !scheme_is_http, !target_is_http)) { config_.stats_.passthrough_internal_redirect_predicate_.inc(); ENVOY_STREAM_LOG(trace, "Internal redirect failed: rejecting redirect targeting {}, by {} predicate", *callbacks_, route_name, predicate->name()); return false; } } // See https://tools.ietf.org/html/rfc7231#section-6.4.4. if (status_code == enumToInt(Http::Code::SeeOther) && downstream_headers.getMethodValue() != Http::Headers::get().MethodValues.Get && downstream_headers.getMethodValue() != Http::Headers::get().MethodValues.Head) { downstream_headers.setMethod(Http::Headers::get().MethodValues.Get); downstream_headers.remove(Http::Headers::get().ContentLength); callbacks_->modifyDecodingBuffer([](Buffer::Instance& data) { data.drain(data.length()); }); } num_internal_redirect->increment(); restore_original_headers.cancel(); // Preserve the original request URL for the second pass. downstream_headers.setEnvoyOriginalUrl(absl::StrCat(scheme_is_http ? Http::Headers::get().SchemeValues.Http : Http::Headers::get().SchemeValues.Https, "://", original_host, original_path)); return true; }
846
True
1
CVE-2022-21655
False
False
False
False
AV:N/AC:M/Au:N/C:N/I:N/A:P
NETWORK
MEDIUM
NONE
NONE
NONE
PARTIAL
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'name': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-670'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}]
2022-03-02T14:27Z
2022-02-22T23:15Z
Always-Incorrect Control Flow Implementation
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.
https://cwe.mitre.org/data/definitions/670.html
0
Yan Avlasov
2022-02-01 19:59:31+00:00
CVE-2022-21655 Crash with direct_response Signed-off-by: Yan Avlasov <[email protected]>
177d608155ba8b11598b9bbf8240e90d8c350682
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Router::TEST_F
Envoy::Router::TEST_F( RouterTest , MissingRequiredHeaders)
['RouterTest', 'MissingRequiredHeaders']
TEST_F(RouterTest, MissingRequiredHeaders) { NiceMock<Http::MockRequestEncoder> encoder; Http::ResponseDecoder* response_decoder = nullptr; expectNewStreamWithImmediateEncoder(encoder, &response_decoder, Http::Protocol::Http10); expectResponseTimerCreate(); Http::TestRequestHeaderMapImpl headers; HttpTestUtility::addDefaultHeaders(headers); headers.removeMethod(); EXPECT_CALL(encoder, encodeHeaders(_, _)) .WillOnce(Invoke([](const Http::RequestHeaderMap& headers, bool) -> Http::Status { return Http::HeaderUtility::checkRequiredRequestHeaders(headers); })); EXPECT_CALL( callbacks_, sendLocalReply(Http::Code::ServiceUnavailable, testing::Eq("missing required header: :method"), _, _, "filter_removed_required_request_headers{missing_required_header:_:method}")) .WillOnce(testing::InvokeWithoutArgs([] {})); router_.decodeHeaders(headers, true); router_.onDestroy(); }
162
True
1
CVE-2022-21655
False
False
False
False
AV:N/AC:M/Au:N/C:N/I:N/A:P
NETWORK
MEDIUM
NONE
NONE
NONE
PARTIAL
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
NONE
NONE
HIGH
7.5
HIGH
3.9
3.6
False
[{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'name': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-670'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}]
2022-03-02T14:27Z
2022-02-22T23:15Z
Always-Incorrect Control Flow Implementation
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.
https://cwe.mitre.org/data/definitions/670.html
0
Yan Avlasov
2022-02-01 19:59:31+00:00
CVE-2022-21655 Crash with direct_response Signed-off-by: Yan Avlasov <[email protected]>
177d608155ba8b11598b9bbf8240e90d8c350682
False
envoyproxy/envoy
Cloud-native high-performance edge/middle/service proxy
2016-08-08 15:07:24
2022-08-27 20:59:09
https://www.envoyproxy.io
envoyproxy
20284.0
3840.0
Envoy::Router::TEST_F
Envoy::Router::TEST_F( RouterTest , RetryUpstreamResetResponseStarted)
['RouterTest', 'RetryUpstreamResetResponseStarted']
TEST_F(RouterTest, RetryUpstreamResetResponseStarted) { NiceMock<Http::MockRequestEncoder> encoder1; Http::ResponseDecoder* response_decoder = nullptr; expectNewStreamWithImmediateEncoder(encoder1, &response_decoder, Http::Protocol::Http10); expectResponseTimerCreate(); Http::TestRequestHeaderMapImpl headers{{"x-envoy-retry-on", "5xx"}, {"x-envoy-internal", "true"}}; HttpTestUtility::addDefaultHeaders(headers); router_.decodeHeaders(headers, true); EXPECT_EQ(1U, callbacks_.route_->route_entry_.virtual_cluster_.stats().upstream_rq_total_.value()); // Since the response is already started we don't retry. EXPECT_CALL(*router_.retry_state_, shouldRetryHeaders(_, _, _)).WillOnce(Return(RetryStatus::No)); EXPECT_CALL(callbacks_, encodeHeaders_(_, false)); Http::ResponseHeaderMapPtr response_headers( new Http::TestResponseHeaderMapImpl{{":status", "200"}}); EXPECT_CALL(cm_.thread_local_cluster_.conn_pool_.host_->outlier_detector_, putHttpResponseCode(200)); response_decoder->decodeHeaders(std::move(response_headers), false); EXPECT_CALL(cm_.thread_local_cluster_.conn_pool_.host_->outlier_detector_, putResult(Upstream::Outlier::Result::LocalOriginConnectFailed, _)); // Normally, sendLocalReply will actually send the reply, but in this case the // HCM will detect the headers have already been sent and not route through // the encoder again. EXPECT_CALL(callbacks_, sendLocalReply(_, _, _, _, _)).WillOnce(testing::InvokeWithoutArgs([] { })); encoder1.stream_.resetStream(Http::StreamResetReason::RemoteReset); // For normal HTTP, once we have a 200 we consider this a success, even if a // later reset occurs. EXPECT_TRUE(verifyHostUpstreamStats(1, 0)); EXPECT_EQ(1U, callbacks_.route_->route_entry_.virtual_cluster_.stats().upstream_rq_total_.value()); }
291
True
1
CVE-2019-15296
False
False
False
True
AV:N/AC:M/Au:N/C:P/I:P/A:P
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
PARTIAL
6.8
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
LOCAL
LOW
NONE
REQUIRED
UNCHANGED
HIGH
HIGH
HIGH
7.8
HIGH
1.8
5.9
False
[{'url': 'https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174', 'name': 'https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html', 'name': '[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update', 'refsource': 'MLIST', 'tags': ['Third Party Advisory']}, {'url': 'https://www.debian.org/security/2019/dsa-4522', 'name': 'DSA-4522', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'https://seclists.org/bugtraq/2019/Sep/28', 'name': '20190916 [SECURITY] [DSA 4522-1] faad2 security update', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/202006-17', 'name': 'GLSA-202006-17', 'refsource': 'GENTOO', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow is later performed via getdword_n(&ld->start[words], ld->bytes_left).'}]
2020-06-15T18:15Z
2019-08-21T07:15Z
Improper Restriction of Operations within the Bounds of a Memory Buffer
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
https://cwe.mitre.org/data/definitions/119.html
0
Fabian Greffrath
2019-06-10 13:58:40+02:00
Fix a couple buffer overflows https://hackerone.com/reports/502816 https://hackerone.com/reports/507858 https://github.com/videolan/vlc/blob/master/contrib/src/faad2/faad2-fix-overflows.patch
942c3e0aee748ea6fe97cb2c1aa5893225316174
False
knik0/faad2
Freeware Advanced Audio (AAC) Decoder faad2 mirror
2017-07-25 07:35:55
2022-08-24 06:26:39
https://sourceforge.net/projects/faac/
knik0
110.0
46.0
faad_resetbits
faad_resetbits( bitfile * ld , int bits)
['ld', 'bits']
void faad_resetbits(bitfile *ld, int bits) { uint32_t tmp; int words = bits >> 5; int remainder = bits & 0x1F; ld->bytes_left = ld->buffer_size - words*4; if (ld->bytes_left >= 4) { tmp = getdword(&ld->start[words]); ld->bytes_left -= 4; } else { tmp = getdword_n(&ld->start[words], ld->bytes_left); ld->bytes_left = 0; } ld->bufa = tmp; if (ld->bytes_left >= 4) { tmp = getdword(&ld->start[words+1]); ld->bytes_left -= 4; } else { tmp = getdword_n(&ld->start[words+1], ld->bytes_left); ld->bytes_left = 0; } ld->bufb = tmp; ld->bits_left = 32 - remainder; ld->tail = &ld->start[words+2]; /* recheck for reading too many bytes */ ld->error = 0; // if (ld->bytes_left == 0) // ld->no_more_reading = 1; // if (ld->bytes_left < 0) // ld->error = 1; }
195
True
1
CVE-2021-32272
False
False
False
True
AV:N/AC:M/Au:N/C:P/I:P/A:P
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
PARTIAL
6.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
LOCAL
LOW
NONE
REQUIRED
UNCHANGED
HIGH
HIGH
HIGH
7.8
HIGH
1.8
5.9
False
[{'url': 'https://github.com/knik0/faad2/issues/57', 'name': 'https://github.com/knik0/faad2/issues/57', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24', 'name': 'https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.debian.org/security/2022/dsa-5109', 'name': 'DSA-5109', 'refsource': 'DEBIAN', 'tags': ['Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.10.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution.'}]
2022-04-22T16:20Z
2021-09-20T16:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Fabian Greffrath
2020-08-31 10:00:37+02:00
fix heap-buffer-overflow in mp4read.c This originated from an integer overflow: If mp4config.frame.ents would be read-in with a value of (uint32t)(-1), it would overflow to 0 in the size calculation for the allocation in the next line. The malloc() function would then successfully return a pointer to a memory region of size 0, which will cause a segfault when written to. Fixes #57.
1b71a6ba963d131375f5e489b3b25e36f19f3f24
False
knik0/faad2
Freeware Advanced Audio (AAC) Decoder faad2 mirror
2017-07-25 07:35:55
2022-08-24 06:26:39
https://sourceforge.net/projects/faac/
knik0
110.0
46.0
stszin
stszin( int size)
['size']
static int stszin(int size) { int cnt; uint32_t ofs; // version/flags u32in(); // Sample size u32in(); // Number of entries mp4config.frame.ents = u32in(); // fixme: check atom size mp4config.frame.data = malloc(sizeof(*mp4config.frame.data) * (mp4config.frame.ents + 1)); if (!mp4config.frame.data) return ERR_FAIL; ofs = 0; mp4config.frame.data[0] = ofs; for (cnt = 0; cnt < mp4config.frame.ents; cnt++) { uint32_t fsize = u32in(); ofs += fsize; if (mp4config.frame.maxsize < fsize) mp4config.frame.maxsize = fsize; mp4config.frame.data[cnt + 1] = ofs; if (ofs < mp4config.frame.data[cnt]) return ERR_FAIL; } return size; }
167
True
1
CVE-2021-26567
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
LOW
NONE
UNCHANGED
HIGH
HIGH
HIGH
8.8
HIGH
2.8
5.9
False
[{'url': 'https://www.synology.com/security/advisory/Synology_SA_20_26', 'name': 'https://www.synology.com/security/advisory/Synology_SA_20_26', 'refsource': 'CONFIRM', 'tags': ['Vendor Advisory']}, {'url': 'https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa', 'name': 'https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa', 'refsource': 'MISC', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'versionEndExcluding': '6.2.3-25426-3', 'cpe_name': []}]}, {'operator': 'AND', 'children': [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': False, 'cpe23Uri': 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe_name': []}]}], 'cpe_match': []}, {'operator': 'AND', 'children': [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': False, 'cpe23Uri': 'cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*', 'cpe_name': []}]}], 'cpe_match': []}, {'operator': 'AND', 'children': [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:synology:diskstation_manager_unified_controller:3.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': False, 'cpe23Uri': 'cpe:2.3:h:synology:uc3200:-:*:*:*:*:*:*:*', 'cpe_name': []}]}], 'cpe_match': []}]
[{'lang': 'en', 'value': 'Stack-based buffer overflow vulnerability in frontend/main.c in faad2 before 2.2.7.1 allow local attackers to execute arbitrary code via filename and pathname options.'}]
2021-03-12T14:15Z
2021-02-26T22:15Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
knik
2012-03-04 09:59:02+00:00
Dynamically allocate file name buffers.
720f7004d6c4aabee19aad16e7c456ed76a3ebfa
False
knik0/faad2
Freeware Advanced Audio (AAC) Decoder faad2 mirror
2017-07-25 07:35:55
2022-08-24 06:26:39
https://sourceforge.net/projects/faac/
knik0
110.0
46.0
main
main( int argc , char * argv [ ])
['argc']
int main(int argc, char *argv[]) { int result; int infoOnly = 0; int writeToStdio = 0; int readFromStdin = 0; int object_type = LC; int def_srate = 0; int downMatrix = 0; int format = 1; int outputFormat = FAAD_FMT_16BIT; int outfile_set = 0; int adts_out = 0; int old_format = 0; int showHelp = 0; int mp4file = 0; int noGapless = 0; char *fnp; char aacFileName[255]; char audioFileName[255]; char adtsFileName[255]; unsigned char header[8]; float length = 0; FILE *hMP4File; /* System dependant types */ #ifdef _WIN32 long begin; #else clock_t begin; #endif unsigned long cap = NeAACDecGetCapabilities(); /* begin process command line */ progName = argv[0]; while (1) { int c = -1; int option_index = 0; static struct option long_options[] = { { "quiet", 0, 0, 'q' }, { "outfile", 0, 0, 'o' }, { "adtsout", 0, 0, 'a' }, { "oldformat", 0, 0, 't' }, { "format", 0, 0, 'f' }, { "bits", 0, 0, 'b' }, { "samplerate", 0, 0, 's' }, { "objecttype", 0, 0, 'l' }, { "downmix", 0, 0, 'd' }, { "info", 0, 0, 'i' }, { "stdio", 0, 0, 'w' }, { "stdio", 0, 0, 'g' }, { "help", 0, 0, 'h' }, { 0, 0, 0, 0 } }; c = getopt_long(argc, argv, "o:a:s:f:b:l:wgdhitq", long_options, &option_index); if (c == -1) break; switch (c) { case 'o': if (optarg) { outfile_set = 1; strcpy(audioFileName, optarg); } break; case 'a': if (optarg) { adts_out = 1; strcpy(adtsFileName, optarg); } break; case 's': if (optarg) { char dr[10]; if (sscanf(optarg, "%s", dr) < 1) { def_srate = 0; } else { def_srate = atoi(dr); } } break; case 'f': if (optarg) { char dr[10]; if (sscanf(optarg, "%s", dr) < 1) { format = 1; } else { format = atoi(dr); if ((format < 1) || (format > 2)) showHelp = 1; } } break; case 'b': if (optarg) { char dr[10]; if (sscanf(optarg, "%s", dr) < 1) { outputFormat = FAAD_FMT_16BIT; /* just use default */ } else { outputFormat = atoi(dr); if ((outputFormat < 1) || (outputFormat > 5)) showHelp = 1; } } break; case 'l': if (optarg) { char dr[10]; if (sscanf(optarg, "%s", dr) < 1) { object_type = LC; /* default */ } else { object_type = atoi(dr); if ((object_type != LC) && (object_type != MAIN) && (object_type != LTP) && (object_type != LD)) { showHelp = 1; } } } break; case 't': old_format = 1; break; case 'd': downMatrix = 1; break; case 'w': writeToStdio = 1; break; case 'g': noGapless = 1; break; case 'i': infoOnly = 1; break; case 'h': showHelp = 1; break; case 'q': quiet = 1; break; default: break; } } faad_fprintf(stderr, " *********** Ahead Software MPEG-4 AAC Decoder V%s ******************\n\n", FAAD2_VERSION); faad_fprintf(stderr, " Build: %s\n", __DATE__); faad_fprintf(stderr, " Copyright 2002-2004: Ahead Software AG\n"); faad_fprintf(stderr, " http://www.audiocoding.com\n"); if (cap & FIXED_POINT_CAP) faad_fprintf(stderr, " Fixed point version\n"); else faad_fprintf(stderr, " Floating point version\n"); faad_fprintf(stderr, "\n"); faad_fprintf(stderr, " This program is free software; you can redistribute it and/or modify\n"); faad_fprintf(stderr, " it under the terms of the GNU General Public License.\n"); faad_fprintf(stderr, "\n"); faad_fprintf(stderr, " **************************************************************************\n\n"); /* check that we have at least two non-option arguments */ /* Print help if requested */ if (((argc - optind) < 1) || showHelp) { usage(); return 1; } #if 0 /* only allow raw data on stdio */ if (writeToStdio == 1) { format = 2; } #endif /* point to the specified file name */ strcpy(aacFileName, argv[optind]); #ifdef _WIN32 begin = GetTickCount(); #else begin = clock(); #endif /* Only calculate the path and open the file for writing if we are not writing to stdout. */ if(!writeToStdio && !outfile_set) { strcpy(audioFileName, aacFileName); fnp = (char *)strrchr(audioFileName,'.'); if (fnp) fnp[0] = '\0'; strcat(audioFileName, file_ext[format]); } /* check for mp4 file */ if (0 == strcmp(aacFileName, "-")) { faad_fprintf(stderr, "Reading from stdin: %s\n", aacFileName); readFromStdin = 1; hMP4File = stdin; #ifdef _WIN32 setmode(fileno(stdin), O_BINARY); #endif } else { mp4file = 0; hMP4File = fopen(aacFileName, "rb"); if (!hMP4File) { faad_fprintf(stderr, "Error opening file: %s\n", aacFileName); return 1; } } fread(header, 1, 8, hMP4File); if (! readFromStdin ) fclose(hMP4File); if (header[4] == 'f' && header[5] == 't' && header[6] == 'y' && header[7] == 'p') mp4file = 1; if (mp4file) { result = decodeMP4file(aacFileName, audioFileName, adtsFileName, writeToStdio, outputFormat, format, downMatrix, noGapless, infoOnly, adts_out, &length); } else { if (readFromStdin == 1) { ungetc(header[7],hMP4File); ungetc(header[6],hMP4File); ungetc(header[5],hMP4File); ungetc(header[4],hMP4File); ungetc(header[3],hMP4File); ungetc(header[2],hMP4File); ungetc(header[1],hMP4File); ungetc(header[0],hMP4File); } result = decodeAACfile(aacFileName, audioFileName, adtsFileName, writeToStdio, def_srate, object_type, outputFormat, format, downMatrix, infoOnly, adts_out, old_format, &length); } if (!result && !infoOnly) { #ifdef _WIN32 float dec_length = (float)(GetTickCount()-begin)/1000.0; SetConsoleTitle("FAAD"); #else /* clock() grabs time since the start of the app but when we decode multiple files, each file has its own starttime (begin). */ float dec_length = (float)(clock() - begin)/(float)CLOCKS_PER_SEC; #endif faad_fprintf(stderr, "Decoding %s took: %5.2f sec. %5.2fx real-time.\n", aacFileName, dec_length, length/dec_length); } return 0; }
1258
True
1
CVE-2019-15683
False
False
False
False
AV:N/AC:L/Au:N/C:P/I:P/A:P
NETWORK
LOW
NONE
PARTIAL
PARTIAL
PARTIAL
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
9.8
CRITICAL
3.9
5.9
False
[{'url': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'name': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
HIGH
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:turbovnc:turbovnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2.3', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TurboVNC server code contains stack buffer overflow vulnerability in commit prior to cea98166008301e614e0d36776bf9435a536136e. This could possibly result into remote code execution, since stack frame is not protected with stack canary. This attack appear to be exploitable via network connectivity. To exploit this vulnerability authorization on server is required. These issues have been fixed in commit cea98166008301e614e0d36776bf9435a536136e.'}]
2019-11-05T16:46Z
2019-10-29T19:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
DRC
2019-08-23 09:54:21-05:00
Server: Fix two issues identified by ASan 1. If the TLSPlain and X509Plain security types were both disabled, then rfbOptPamAuth() would overflow the name field in the secTypes structure when testing the "none" security type, since the name of that security type has less than five characters. This issue was innocuous, since the overflow was fully contained within the secTypes structure, but the ASan error caused Xvnc to abort, which made it difficult to detect other errors. 2. If an ill-behaved RFB client sent the TurboVNC Server a fence message with more than 64 bytes, then the TurboVNC Server would try to read that message and subsequently overflow the stack before it detected that the payload was too large. This could never have occurred with any of the VNC viewers that currently support the RFB flow control extensions (TigerVNC and TurboVNC, namely.) This issue was also innocuous, since the stack overflow affected two variables (newScreens and errMsg) that were never accessed before the function returned.
cea98166008301e614e0d36776bf9435a536136e
False
TurboVNC/turbovnc
Main TurboVNC repository
2015-07-29 02:17:57
2022-08-27 15:44:22
https://TurboVNC.org
TurboVNC
532.0
115.0
rfbOptPamAuth
rfbOptPamAuth( void)
['void']
Bool rfbOptPamAuth(void) { SecTypeData *s; for (s = secTypes; s->name != NULL; s++) { if ((!strcmp(s->name, "unixlogin") || !strcmp(&s->name[strlen(s->name) - 5], "plain")) && s->enabled) return TRUE; } return FALSE; }
72
True
1
CVE-2019-15683
False
False
False
False
AV:N/AC:L/Au:N/C:P/I:P/A:P
NETWORK
LOW
NONE
PARTIAL
PARTIAL
PARTIAL
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
9.8
CRITICAL
3.9
5.9
False
[{'url': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'name': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
HIGH
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:turbovnc:turbovnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2.3', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TurboVNC server code contains stack buffer overflow vulnerability in commit prior to cea98166008301e614e0d36776bf9435a536136e. This could possibly result into remote code execution, since stack frame is not protected with stack canary. This attack appear to be exploitable via network connectivity. To exploit this vulnerability authorization on server is required. These issues have been fixed in commit cea98166008301e614e0d36776bf9435a536136e.'}]
2019-11-05T16:46Z
2019-10-29T19:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
DRC
2019-08-23 09:54:21-05:00
Server: Fix two issues identified by ASan 1. If the TLSPlain and X509Plain security types were both disabled, then rfbOptPamAuth() would overflow the name field in the secTypes structure when testing the "none" security type, since the name of that security type has less than five characters. This issue was innocuous, since the overflow was fully contained within the secTypes structure, but the ASan error caused Xvnc to abort, which made it difficult to detect other errors. 2. If an ill-behaved RFB client sent the TurboVNC Server a fence message with more than 64 bytes, then the TurboVNC Server would try to read that message and subsequently overflow the stack before it detected that the payload was too large. This could never have occurred with any of the VNC viewers that currently support the RFB flow control extensions (TigerVNC and TurboVNC, namely.) This issue was also innocuous, since the stack overflow affected two variables (newScreens and errMsg) that were never accessed before the function returned.
cea98166008301e614e0d36776bf9435a536136e
False
TurboVNC/turbovnc
Main TurboVNC repository
2015-07-29 02:17:57
2022-08-27 15:44:22
https://TurboVNC.org
TurboVNC
532.0
115.0
rfbProcessClientNormalMessage
rfbProcessClientNormalMessage( rfbClientPtr cl)
['cl']
static void rfbProcessClientNormalMessage(rfbClientPtr cl) { int n; rfbClientToServerMsg msg; char *str; READ((char *)&msg, 1) switch (msg.type) { case rfbSetPixelFormat: READ(((char *)&msg) + 1, sz_rfbSetPixelFormatMsg - 1) cl->format.bitsPerPixel = msg.spf.format.bitsPerPixel; cl->format.depth = msg.spf.format.depth; cl->format.bigEndian = (msg.spf.format.bigEndian ? 1 : 0); cl->format.trueColour = (msg.spf.format.trueColour ? 1 : 0); cl->format.redMax = Swap16IfLE(msg.spf.format.redMax); cl->format.greenMax = Swap16IfLE(msg.spf.format.greenMax); cl->format.blueMax = Swap16IfLE(msg.spf.format.blueMax); cl->format.redShift = msg.spf.format.redShift; cl->format.greenShift = msg.spf.format.greenShift; cl->format.blueShift = msg.spf.format.blueShift; cl->readyForSetColourMapEntries = TRUE; rfbSetTranslateFunction(cl); return; case rfbFixColourMapEntries: READ(((char *)&msg) + 1, sz_rfbFixColourMapEntriesMsg - 1) rfbLog("rfbProcessClientNormalMessage: FixColourMapEntries unsupported\n"); rfbCloseClient(cl); return; case rfbSetEncodings: { int i; CARD32 enc; Bool firstFence = !cl->enableFence; Bool firstCU = !cl->enableCU; Bool firstGII = !cl->enableGII; Bool logTightCompressLevel = FALSE; READ(((char *)&msg) + 1, sz_rfbSetEncodingsMsg - 1) msg.se.nEncodings = Swap16IfLE(msg.se.nEncodings); cl->preferredEncoding = -1; cl->useCopyRect = FALSE; cl->enableCursorShapeUpdates = FALSE; cl->enableCursorPosUpdates = FALSE; cl->enableLastRectEncoding = FALSE; cl->tightCompressLevel = TIGHT_DEFAULT_COMPRESSION; cl->tightSubsampLevel = TIGHT_DEFAULT_SUBSAMP; cl->tightQualityLevel = -1; cl->imageQualityLevel = -1; for (i = 0; i < msg.se.nEncodings; i++) { READ((char *)&enc, 4) enc = Swap32IfLE(enc); switch (enc) { case rfbEncodingCopyRect: cl->useCopyRect = TRUE; break; case rfbEncodingRaw: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using raw encoding for client %s\n", cl->host); } break; case rfbEncodingRRE: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using rre encoding for client %s\n", cl->host); } break; case rfbEncodingCoRRE: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using CoRRE encoding for client %s\n", cl->host); } break; case rfbEncodingHextile: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using hextile encoding for client %s\n", cl->host); } break; case rfbEncodingZlib: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using zlib encoding for client %s\n", cl->host); } break; case rfbEncodingZRLE: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using ZRLE encoding for client %s\n", cl->host); } break; case rfbEncodingZYWRLE: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using ZYWRLE encoding for client %s\n", cl->host); } break; case rfbEncodingTight: if (cl->preferredEncoding == -1) { cl->preferredEncoding = enc; rfbLog("Using tight encoding for client %s\n", cl->host); } break; case rfbEncodingXCursor: if (!cl->enableCursorShapeUpdates) { rfbLog("Enabling X-style cursor updates for client %s\n", cl->host); cl->enableCursorShapeUpdates = TRUE; cl->useRichCursorEncoding = FALSE; cl->cursorWasChanged = TRUE; } break; case rfbEncodingRichCursor: if (!cl->enableCursorShapeUpdates) { rfbLog("Enabling full-color cursor updates for client %s\n", cl->host); cl->enableCursorShapeUpdates = TRUE; cl->useRichCursorEncoding = TRUE; cl->cursorWasChanged = TRUE; } break; case rfbEncodingPointerPos: if (!cl->enableCursorPosUpdates) { rfbLog("Enabling cursor position updates for client %s\n", cl->host); cl->enableCursorPosUpdates = TRUE; cl->cursorWasMoved = TRUE; cl->cursorX = -1; cl->cursorY = -1; } break; case rfbEncodingLastRect: if (!cl->enableLastRectEncoding) { rfbLog("Enabling LastRect protocol extension for client %s\n", cl->host); cl->enableLastRectEncoding = TRUE; } break; case rfbEncodingFence: if (!cl->enableFence) { rfbLog("Enabling Fence protocol extension for client %s\n", cl->host); cl->enableFence = TRUE; } break; case rfbEncodingContinuousUpdates: if (!cl->enableCU) { rfbLog("Enabling Continuous Updates protocol extension for client %s\n", cl->host); cl->enableCU = TRUE; } break; case rfbEncodingNewFBSize: if (!cl->enableDesktopSize) { if (!rfbAuthDisableRemoteResize) { rfbLog("Enabling Desktop Size protocol extension for client %s\n", cl->host); cl->enableDesktopSize = TRUE; } else rfbLog("WARNING: Remote desktop resizing disabled per system policy.\n"); } break; case rfbEncodingExtendedDesktopSize: if (!cl->enableExtDesktopSize) { if (!rfbAuthDisableRemoteResize) { rfbLog("Enabling Extended Desktop Size protocol extension for client %s\n", cl->host); cl->enableExtDesktopSize = TRUE; } else rfbLog("WARNING: Remote desktop resizing disabled per system policy.\n"); } break; case rfbEncodingGII: if (!cl->enableGII) { rfbLog("Enabling GII extension for client %s\n", cl->host); cl->enableGII = TRUE; } break; default: if (enc >= (CARD32)rfbEncodingCompressLevel0 && enc <= (CARD32)rfbEncodingCompressLevel9) { cl->zlibCompressLevel = enc & 0x0F; cl->tightCompressLevel = enc & 0x0F; if (cl->preferredEncoding == rfbEncodingTight) logTightCompressLevel = TRUE; else rfbLog("Using compression level %d for client %s\n", cl->tightCompressLevel, cl->host); if (rfbInterframe == -1) { if (cl->tightCompressLevel >= 5) { if (!InterframeOn(cl)) { rfbCloseClient(cl); return; } } else InterframeOff(cl); } } else if (enc >= (CARD32)rfbEncodingSubsamp1X && enc <= (CARD32)rfbEncodingSubsampGray) { cl->tightSubsampLevel = enc & 0xFF; rfbLog("Using JPEG subsampling %d for client %s\n", cl->tightSubsampLevel, cl->host); } else if (enc >= (CARD32)rfbEncodingQualityLevel0 && enc <= (CARD32)rfbEncodingQualityLevel9) { cl->tightQualityLevel = JPEG_QUAL[enc & 0x0F]; cl->tightSubsampLevel = JPEG_SUBSAMP[enc & 0x0F]; cl->imageQualityLevel = enc & 0x0F; if (cl->preferredEncoding == rfbEncodingTight) rfbLog("Using JPEG subsampling %d, Q%d for client %s\n", cl->tightSubsampLevel, cl->tightQualityLevel, cl->host); else rfbLog("Using image quality level %d for client %s\n", cl->imageQualityLevel, cl->host); } else if (enc >= (CARD32)rfbEncodingFineQualityLevel0 + 1 && enc <= (CARD32)rfbEncodingFineQualityLevel100) { cl->tightQualityLevel = enc & 0xFF; rfbLog("Using JPEG quality %d for client %s\n", cl->tightQualityLevel, cl->host); } else { rfbLog("rfbProcessClientNormalMessage: ignoring unknown encoding %d (%x)\n", (int)enc, (int)enc); } } /* switch (enc) */ } /* for (i = 0; i < msg.se.nEncodings; i++) */ if (cl->preferredEncoding == -1) cl->preferredEncoding = rfbEncodingTight; if (cl->preferredEncoding == rfbEncodingTight && logTightCompressLevel) rfbLog("Using Tight compression level %d for client %s\n", rfbTightCompressLevel(cl), cl->host); if (cl->enableCursorPosUpdates && !cl->enableCursorShapeUpdates) { rfbLog("Disabling cursor position updates for client %s\n", cl->host); cl->enableCursorPosUpdates = FALSE; } if (cl->enableFence && firstFence) { if (!rfbSendFence(cl, rfbFenceFlagRequest, 0, NULL)) return; } if (cl->enableCU && cl->enableFence && firstCU) { if (!rfbSendEndOfCU(cl)) return; } if (cl->enableGII && firstGII) { /* Send GII server version message to all clients */ rfbGIIServerVersionMsg msg; msg.type = rfbGIIServer; /* We always send as big endian to make things easier on the Java viewer. */ msg.endianAndSubType = rfbGIIVersion | rfbGIIBE; msg.length = Swap16IfLE(sz_rfbGIIServerVersionMsg - 4); msg.maximumVersion = msg.minimumVersion = Swap16IfLE(1); if (WriteExact(cl, (char *)&msg, sz_rfbGIIServerVersionMsg) < 0) { rfbLogPerror("rfbProcessClientNormalMessage: write"); rfbCloseClient(cl); return; } } return; } /* rfbSetEncodings */ case rfbFramebufferUpdateRequest: { RegionRec tmpRegion; BoxRec box; READ(((char *)&msg) + 1, sz_rfbFramebufferUpdateRequestMsg - 1) box.x1 = Swap16IfLE(msg.fur.x); box.y1 = Swap16IfLE(msg.fur.y); box.x2 = box.x1 + Swap16IfLE(msg.fur.w); box.y2 = box.y1 + Swap16IfLE(msg.fur.h); SAFE_REGION_INIT(pScreen, &tmpRegion, &box, 0); if (!msg.fur.incremental || !cl->continuousUpdates) REGION_UNION(pScreen, &cl->requestedRegion, &cl->requestedRegion, &tmpRegion); if (!cl->readyForSetColourMapEntries) { /* client hasn't sent a SetPixelFormat so is using server's */ cl->readyForSetColourMapEntries = TRUE; if (!cl->format.trueColour) { if (!rfbSetClientColourMap(cl, 0, 0)) { REGION_UNINIT(pScreen, &tmpRegion); return; } } } if (!msg.fur.incremental) { REGION_UNION(pScreen, &cl->modifiedRegion, &cl->modifiedRegion, &tmpRegion); REGION_SUBTRACT(pScreen, &cl->copyRegion, &cl->copyRegion, &tmpRegion); REGION_UNION(pScreen, &cl->ifRegion, &cl->ifRegion, &tmpRegion); cl->pendingExtDesktopResize = TRUE; } if (FB_UPDATE_PENDING(cl) && (!cl->deferredUpdateScheduled || rfbDeferUpdateTime == 0 || gettime() - cl->deferredUpdateStart >= (double)rfbDeferUpdateTime)) { if (rfbSendFramebufferUpdate(cl)) cl->deferredUpdateScheduled = FALSE; } REGION_UNINIT(pScreen, &tmpRegion); return; } case rfbKeyEvent: cl->rfbKeyEventsRcvd++; READ(((char *)&msg) + 1, sz_rfbKeyEventMsg - 1) if (!rfbViewOnly && !cl->viewOnly) KeyEvent((KeySym)Swap32IfLE(msg.ke.key), msg.ke.down); return; case rfbPointerEvent: cl->rfbPointerEventsRcvd++; READ(((char *)&msg) + 1, sz_rfbPointerEventMsg - 1) if (pointerClient && (pointerClient != cl)) return; if (msg.pe.buttonMask == 0) pointerClient = NULL; else pointerClient = cl; if (!rfbViewOnly && !cl->viewOnly) { cl->cursorX = (int)Swap16IfLE(msg.pe.x); cl->cursorY = (int)Swap16IfLE(msg.pe.y); PtrAddEvent(msg.pe.buttonMask, cl->cursorX, cl->cursorY, cl); } return; case rfbClientCutText: { int ignoredBytes = 0; READ(((char *)&msg) + 1, sz_rfbClientCutTextMsg - 1) msg.cct.length = Swap32IfLE(msg.cct.length); if (msg.cct.length > rfbMaxClipboard) { rfbLog("Truncating %d-byte clipboard update to %d bytes.\n", msg.cct.length, rfbMaxClipboard); ignoredBytes = msg.cct.length - rfbMaxClipboard; msg.cct.length = rfbMaxClipboard; } if (msg.cct.length <= 0) return; str = (char *)malloc(msg.cct.length); if (str == NULL) { rfbLogPerror("rfbProcessClientNormalMessage: rfbClientCutText out of memory"); rfbCloseClient(cl); return; } if ((n = ReadExact(cl, str, msg.cct.length)) <= 0) { if (n != 0) rfbLogPerror("rfbProcessClientNormalMessage: read"); free(str); rfbCloseClient(cl); return; } if (ignoredBytes > 0) { if ((n = SkipExact(cl, ignoredBytes)) <= 0) { if (n != 0) rfbLogPerror("rfbProcessClientNormalMessage: read"); free(str); rfbCloseClient(cl); return; } } /* NOTE: We do not accept cut text from a view-only client */ if (!rfbViewOnly && !cl->viewOnly && !rfbAuthDisableCBRecv) { vncClientCutText(str, msg.cct.length); if (rfbSyncCutBuffer) rfbSetXCutText(str, msg.cct.length); } free(str); return; } case rfbEnableContinuousUpdates: { BoxRec box; READ(((char *)&msg) + 1, sz_rfbEnableContinuousUpdatesMsg - 1) if (!cl->enableFence || !cl->enableCU) { rfbLog("Ignoring request to enable continuous updates because the client does not\n"); rfbLog("support the flow control extensions.\n"); return; } box.x1 = Swap16IfLE(msg.ecu.x); box.y1 = Swap16IfLE(msg.ecu.y); box.x2 = box.x1 + Swap16IfLE(msg.ecu.w); box.y2 = box.y1 + Swap16IfLE(msg.ecu.h); SAFE_REGION_INIT(pScreen, &cl->cuRegion, &box, 0); cl->continuousUpdates = msg.ecu.enable; if (cl->continuousUpdates) { REGION_EMPTY(pScreen, &cl->requestedRegion); if (!rfbSendFramebufferUpdate(cl)) return; } else { if (!rfbSendEndOfCU(cl)) return; } rfbLog("Continuous updates %s\n", cl->continuousUpdates ? "enabled" : "disabled"); return; } case rfbFence: { CARD32 flags; char data[64]; READ(((char *)&msg) + 1, sz_rfbFenceMsg - 1) flags = Swap32IfLE(msg.f.flags); READ(data, msg.f.length) if (msg.f.length > sizeof(data)) rfbLog("Ignoring fence. Payload of %d bytes is too large.\n", msg.f.length); else HandleFence(cl, flags, msg.f.length, data); return; } #define EDSERROR(format, args...) { \ if (!strlen(errMsg)) \ snprintf(errMsg, 256, "Desktop resize ERROR: "format"\n", args); \ result = rfbEDSResultInvalid; \ } case rfbSetDesktopSize: { int i; struct xorg_list newScreens; rfbClientPtr cl2; int result = rfbEDSResultSuccess; char errMsg[256] = "\0"; ScreenPtr pScreen = screenInfo.screens[0]; READ(((char *)&msg) + 1, sz_rfbSetDesktopSizeMsg - 1) if (msg.sds.numScreens < 1) EDSERROR("Requested number of screens %d is invalid", msg.sds.numScreens); msg.sds.w = Swap16IfLE(msg.sds.w); msg.sds.h = Swap16IfLE(msg.sds.h); if (msg.sds.w < 1 || msg.sds.h < 1) EDSERROR("Requested framebuffer dimensions %dx%d are invalid", msg.sds.w, msg.sds.h); xorg_list_init(&newScreens); for (i = 0; i < msg.sds.numScreens; i++) { rfbScreenInfo *screen = rfbNewScreen(0, 0, 0, 0, 0, 0); READ((char *)&screen->s, sizeof(rfbScreenDesc)) screen->s.id = Swap32IfLE(screen->s.id); screen->s.x = Swap16IfLE(screen->s.x); screen->s.y = Swap16IfLE(screen->s.y); screen->s.w = Swap16IfLE(screen->s.w); screen->s.h = Swap16IfLE(screen->s.h); screen->s.flags = Swap32IfLE(screen->s.flags); if (screen->s.w < 1 || screen->s.h < 1) EDSERROR("Screen 0x%.8x requested dimensions %dx%d are invalid", (unsigned int)screen->s.id, screen->s.w, screen->s.h); if (screen->s.x >= msg.sds.w || screen->s.y >= msg.sds.h || screen->s.x + screen->s.w > msg.sds.w || screen->s.y + screen->s.h > msg.sds.h) EDSERROR("Screen 0x%.8x requested geometry %dx%d+%d+%d exceeds requested framebuffer dimensions", (unsigned int)screen->s.id, screen->s.w, screen->s.h, screen->s.x, screen->s.y); if (rfbFindScreenID(&newScreens, screen->s.id)) { EDSERROR("Screen 0x%.8x duplicate ID", (unsigned int)screen->s.id); free(screen); } else rfbAddScreen(&newScreens, screen); } if (cl->viewOnly) { rfbLog("NOTICE: Ignoring remote desktop resize request from a view-only client.\n"); result = rfbEDSResultProhibited; } else if (result == rfbEDSResultSuccess) { result = ResizeDesktop(pScreen, cl, msg.sds.w, msg.sds.h, &newScreens); if (result == rfbEDSResultSuccess) return; } else rfbLog(errMsg); rfbRemoveScreens(&newScreens); /* Send back the error only to the requesting client. This loop is necessary because the client may have been shut down as a result of an error in ResizeDesktop(). */ for (cl2 = rfbClientHead; cl2; cl2 = cl2->next) { if (cl2 == cl) { cl2->pendingExtDesktopResize = TRUE; cl2->reason = rfbEDSReasonClient; cl2->result = result; rfbSendFramebufferUpdate(cl2); break; } } return; } case rfbGIIClient: { CARD8 endianAndSubType, littleEndian, subType; READ((char *)&endianAndSubType, 1); littleEndian = (endianAndSubType & rfbGIIBE) ? 0 : 1; subType = endianAndSubType & ~rfbGIIBE; switch (subType) { case rfbGIIVersion: READ((char *)&msg.giicv.length, sz_rfbGIIClientVersionMsg - 2); if (littleEndian != *(const char *)&rfbEndianTest) { msg.giicv.length = Swap16(msg.giicv.length); msg.giicv.version = Swap16(msg.giicv.version); } if (msg.giicv.length != sz_rfbGIIClientVersionMsg - 4 || msg.giicv.version < 1) { rfbLog("ERROR: Malformed GII client version message\n"); rfbCloseClient(cl); return; } rfbLog("Client supports GII version %d\n", msg.giicv.version); break; case rfbGIIDeviceCreate: { int i; rfbDevInfo dev; rfbGIIDeviceCreatedMsg dcmsg; memset(&dev, 0, sizeof(dev)); dcmsg.deviceOrigin = 0; READ((char *)&msg.giidc.length, sz_rfbGIIDeviceCreateMsg - 2); if (littleEndian != *(const char *)&rfbEndianTest) { msg.giidc.length = Swap16(msg.giidc.length); msg.giidc.vendorID = Swap32(msg.giidc.vendorID); msg.giidc.productID = Swap32(msg.giidc.productID); msg.giidc.canGenerate = Swap32(msg.giidc.canGenerate); msg.giidc.numRegisters = Swap32(msg.giidc.numRegisters); msg.giidc.numValuators = Swap32(msg.giidc.numValuators); msg.giidc.numButtons = Swap32(msg.giidc.numButtons); } rfbLog("GII Device Create: %s\n", msg.giidc.deviceName); #ifdef GII_DEBUG rfbLog(" Vendor ID: %d\n", msg.giidc.vendorID); rfbLog(" Product ID: %d\n", msg.giidc.productID); rfbLog(" Event mask: %.8x\n", msg.giidc.canGenerate); rfbLog(" Registers: %d\n", msg.giidc.numRegisters); rfbLog(" Valuators: %d\n", msg.giidc.numValuators); rfbLog(" Buttons: %d\n", msg.giidc.numButtons); #endif if (msg.giidc.length != sz_rfbGIIDeviceCreateMsg - 4 + msg.giidc.numValuators * sz_rfbGIIValuator) { rfbLog("ERROR: Malformed GII device create message\n"); rfbCloseClient(cl); return; } if (msg.giidc.numButtons > MAX_BUTTONS) { rfbLog("GII device create ERROR: %d buttons exceeds max of %d\n", msg.giidc.numButtons, MAX_BUTTONS); SKIP(msg.giidc.numValuators * sz_rfbGIIValuator); goto sendMessage; } if (msg.giidc.numValuators > MAX_VALUATORS) { rfbLog("GII device create ERROR: %d valuators exceeds max of %d\n", msg.giidc.numValuators, MAX_VALUATORS); SKIP(msg.giidc.numValuators * sz_rfbGIIValuator); goto sendMessage; } memcpy(&dev.name, msg.giidc.deviceName, 32); dev.numButtons = msg.giidc.numButtons; dev.numValuators = msg.giidc.numValuators; dev.eventMask = msg.giidc.canGenerate; dev.mode = (dev.eventMask & rfbGIIValuatorAbsoluteMask) ? Absolute : Relative; dev.productID = msg.giidc.productID; if (dev.mode == Relative) { rfbLog("GII device create ERROR: relative valuators not supported (yet)\n"); SKIP(msg.giidc.numValuators * sz_rfbGIIValuator); goto sendMessage; } for (i = 0; i < dev.numValuators; i++) { rfbGIIValuator *v = &dev.valuators[i]; READ((char *)v, sz_rfbGIIValuator); if (littleEndian != *(const char *)&rfbEndianTest) { v->index = Swap32(v->index); v->rangeMin = Swap32((CARD32)v->rangeMin); v->rangeCenter = Swap32((CARD32)v->rangeCenter); v->rangeMax = Swap32((CARD32)v->rangeMax); v->siUnit = Swap32(v->siUnit); v->siAdd = Swap32((CARD32)v->siAdd); v->siMul = Swap32((CARD32)v->siMul); v->siDiv = Swap32((CARD32)v->siDiv); v->siShift = Swap32((CARD32)v->siShift); } #ifdef GII_DEBUG rfbLog(" Valuator: %s (%s)\n", v->longName, v->shortName); rfbLog(" Index: %d\n", v->index); rfbLog(" Range: min = %d, center = %d, max = %d\n", v->rangeMin, v->rangeCenter, v->rangeMax); rfbLog(" SI unit: %d\n", v->siUnit); rfbLog(" SI add: %d\n", v->siAdd); rfbLog(" SI multiply: %d\n", v->siMul); rfbLog(" SI divide: %d\n", v->siDiv); rfbLog(" SI shift: %d\n", v->siShift); #endif } for (i = 0; i < cl->numDevices; i++) { if (!strcmp(dev.name, cl->devices[i].name)) { rfbLog("Device \'%s\' already exists with GII device ID %d\n", dev.name, i + 1); dcmsg.deviceOrigin = Swap32IfLE(i + 1); goto sendMessage; } } if (rfbVirtualTablet || AddExtInputDevice(&dev)) { memcpy(&cl->devices[cl->numDevices], &dev, sizeof(dev)); cl->numDevices++; dcmsg.deviceOrigin = Swap32IfLE(cl->numDevices); } rfbLog("GII device ID = %d\n", cl->numDevices); sendMessage: /* Send back a GII device created message */ dcmsg.type = rfbGIIServer; /* We always send as big endian to make things easier on the Java viewer. */ dcmsg.endianAndSubType = rfbGIIDeviceCreate | rfbGIIBE; dcmsg.length = Swap16IfLE(sz_rfbGIIDeviceCreatedMsg - 4); if (WriteExact(cl, (char *)&dcmsg, sz_rfbGIIDeviceCreatedMsg) < 0) { rfbLogPerror("rfbProcessClientNormalMessage: write"); rfbCloseClient(cl); return; } break; } case rfbGIIDeviceDestroy: READ((char *)&msg.giidd.length, sz_rfbGIIDeviceDestroyMsg - 2); if (littleEndian != *(const char *)&rfbEndianTest) { msg.giidd.length = Swap16(msg.giidd.length); msg.giidd.deviceOrigin = Swap32(msg.giidd.deviceOrigin); } if (msg.giidd.length != sz_rfbGIIDeviceDestroyMsg - 4) { rfbLog("ERROR: Malformed GII device create message\n"); rfbCloseClient(cl); return; } RemoveExtInputDevice(cl, msg.giidd.deviceOrigin - 1); break; case rfbGIIEvent: { CARD16 length; READ((char *)&length, sizeof(CARD16)); if (littleEndian != *(const char *)&rfbEndianTest) length = Swap16(length); while (length > 0) { CARD8 eventSize, eventType; READ((char *)&eventSize, 1); READ((char *)&eventType, 1); switch (eventType) { case rfbGIIButtonPress: case rfbGIIButtonRelease: { rfbGIIButtonEvent b; rfbDevInfo *dev; READ((char *)&b.pad, sz_rfbGIIButtonEvent - 2); if (littleEndian != *(const char *)&rfbEndianTest) { b.deviceOrigin = Swap32(b.deviceOrigin); b.buttonNumber = Swap32(b.buttonNumber); } if (eventSize != sz_rfbGIIButtonEvent || b.deviceOrigin <= 0 || b.buttonNumber < 1) { rfbLog("ERROR: Malformed GII button event\n"); rfbCloseClient(cl); return; } if (eventSize > length) { rfbLog("ERROR: Malformed GII event message\n"); rfbCloseClient(cl); return; } length -= eventSize; if (b.deviceOrigin < 1 || b.deviceOrigin > cl->numDevices) { rfbLog("ERROR: GII button event from non-existent device %d\n", b.deviceOrigin); rfbCloseClient(cl); return; } dev = &cl->devices[b.deviceOrigin - 1]; if ((eventType == rfbGIIButtonPress && (dev->eventMask & rfbGIIButtonPressMask) == 0) || (eventType == rfbGIIButtonRelease && (dev->eventMask & rfbGIIButtonReleaseMask) == 0)) { rfbLog("ERROR: Device %d can't generate GII button events\n", b.deviceOrigin); rfbCloseClient(cl); return; } if (b.buttonNumber > dev->numButtons) { rfbLog("ERROR: GII button %d event for device %d exceeds button count (%d)\n", b.buttonNumber, b.deviceOrigin, dev->numButtons); rfbCloseClient(cl); return; } #ifdef GII_DEBUG rfbLog("Device %d button %d %s\n", b.deviceOrigin, b.buttonNumber, eventType == rfbGIIButtonPress ? "PRESS" : "release"); fflush(stderr); #endif ExtInputAddEvent(dev, eventType == rfbGIIButtonPress ? ButtonPress : ButtonRelease, b.buttonNumber); break; } case rfbGIIValuatorRelative: case rfbGIIValuatorAbsolute: { rfbGIIValuatorEvent v; int i; rfbDevInfo *dev; READ((char *)&v.pad, sz_rfbGIIValuatorEvent - 2); if (littleEndian != *(const char *)&rfbEndianTest) { v.deviceOrigin = Swap32(v.deviceOrigin); v.first = Swap32(v.first); v.count = Swap32(v.count); } if (eventSize != sz_rfbGIIValuatorEvent + sizeof(int) * v.count) { rfbLog("ERROR: Malformed GII valuator event\n"); rfbCloseClient(cl); return; } if (eventSize > length) { rfbLog("ERROR: Malformed GII event message\n"); rfbCloseClient(cl); return; } length -= eventSize; if (v.deviceOrigin < 1 || v.deviceOrigin > cl->numDevices) { rfbLog("ERROR: GII valuator event from non-existent device %d\n", v.deviceOrigin); rfbCloseClient(cl); return; } dev = &cl->devices[v.deviceOrigin - 1]; if ((eventType == rfbGIIValuatorRelative && (dev->eventMask & rfbGIIValuatorRelativeMask) == 0) || (eventType == rfbGIIValuatorAbsolute && (dev->eventMask & rfbGIIValuatorAbsoluteMask) == 0)) { rfbLog("ERROR: Device %d cannot generate GII valuator events\n", v.deviceOrigin); rfbCloseClient(cl); return; } if (v.first + v.count > dev->numValuators) { rfbLog("ERROR: GII valuator event for device %d exceeds valuator count (%d)\n", v.deviceOrigin, dev->numValuators); rfbCloseClient(cl); return; } #ifdef GII_DEBUG rfbLog("Device %d Valuator %s first=%d count=%d:\n", v.deviceOrigin, eventType == rfbGIIValuatorRelative ? "rel" : "ABS", v.first, v.count); #endif for (i = v.first; i < v.first + v.count; i++) { READ((char *)&dev->values[i], sizeof(int)); if (littleEndian != *(const char *)&rfbEndianTest) dev->values[i] = Swap32((CARD32)dev->values[i]); #ifdef GII_DEBUG fprintf(stderr, "v[%d]=%d ", i, dev->values[i]); #endif } #ifdef GII_DEBUG fprintf(stderr, "\n"); #endif if (v.count > 0) { dev->valFirst = v.first; dev->valCount = v.count; dev->mode = eventType == rfbGIIValuatorAbsolute ? Absolute : Relative; ExtInputAddEvent(dev, MotionNotify, 0); } break; } default: rfbLog("ERROR: This server cannot handle GII event type %d\n", eventType); rfbCloseClient(cl); return; } /* switch (eventType) */ } /* while (length > 0) */ if (length != 0) { rfbLog("ERROR: Malformed GII event message\n"); rfbCloseClient(cl); return; } break; } /* rfbGIIEvent */ } /* switch (subType) */ return; } /* rfbGIIClient */ default: rfbLog("rfbProcessClientNormalMessage: unknown message type %d\n", msg.type); rfbLog(" ... closing connection\n"); rfbCloseClient(cl); return; } /* switch (msg.type) */ }
5240
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::deinit
ZlibInStream::deinit()
[]
void ZlibInStream::deinit() { assert(zs != NULL); removeUnderlying(); inflateEnd(zs); delete zs; zs = NULL; }
30
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::overrun
ZlibInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int ZlibInStream::overrun(int itemSize, int nItems, bool wait) { if (itemSize > bufSize) throw Exception("ZlibInStream overrun: max itemSize exceeded"); if (!underlying) throw Exception("ZlibInStream overrun: no underlying stream"); if (end - ptr != 0) memmove(start, ptr, end - ptr); offset += ptr - start; end -= ptr - start; ptr = start; while (end - ptr < itemSize) { if (!decompress(wait)) return 0; } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
117
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::removeUnderlying
ZlibInStream::removeUnderlying()
[]
void ZlibInStream::removeUnderlying() { ptr = end = start; if (!underlying) return; while (bytesIn > 0) { decompress(true); end = start; // throw away any data } underlying = 0; }
41
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
CMsgReader::readExtendedClipboard
CMsgReader::readExtendedClipboard( rdr :: S32 len)
['len']
void CMsgReader::readExtendedClipboard(rdr::S32 len) { rdr::U32 flags; rdr::U32 action; if (len < 4) throw Exception("Invalid extended clipboard message"); if (len > maxCutText) { vlog.error("Extended clipboard message too long (%d bytes) - ignoring", len); is->skip(len); return; } flags = is->readU32(); action = flags & clipboardActionMask; if (action & clipboardCaps) { int i; size_t num; rdr::U32 lengths[16]; num = 0; for (i = 0;i < 16;i++) { if (flags & (1 << i)) num++; } if (len < (rdr::S32)(4 + 4*num)) throw Exception("Invalid extended clipboard message"); num = 0; for (i = 0;i < 16;i++) { if (flags & (1 << i)) lengths[num++] = is->readU32(); } handler->handleClipboardCaps(flags, lengths); } else if (action == clipboardProvide) { rdr::ZlibInStream zis; int i; size_t num; size_t lengths[16]; rdr::U8* buffers[16]; zis.setUnderlying(is, len - 4); num = 0; for (i = 0;i < 16;i++) { if (!(flags & 1 << i)) continue; lengths[num] = zis.readU32(); if (lengths[num] > (size_t)maxCutText) { vlog.error("Extended clipboard data too long (%d bytes) - ignoring", (unsigned)lengths[num]); zis.skip(lengths[num]); flags &= ~(1 << i); continue; } buffers[num] = new rdr::U8[lengths[num]]; zis.readBytes(buffers[num], lengths[num]); num++; } zis.removeUnderlying(); handler->handleClipboardProvide(flags, lengths, buffers); num = 0; for (i = 0;i < 16;i++) { if (!(flags & 1 << i)) continue; delete [] buffers[num++]; } } else { switch (action) { case clipboardRequest: handler->handleClipboardRequest(flags); break; case clipboardPeek: handler->handleClipboardPeek(flags); break; case clipboardNotify: handler->handleClipboardNotify(flags); break; default: throw Exception("Invalid extended clipboard action"); } } }
488
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
SMsgReader::readExtendedClipboard
SMsgReader::readExtendedClipboard( rdr :: S32 len)
['len']
void SMsgReader::readExtendedClipboard(rdr::S32 len) { rdr::U32 flags; rdr::U32 action; if (len < 4) throw Exception("Invalid extended clipboard message"); if (len > maxCutText) { vlog.error("Extended clipboard message too long (%d bytes) - ignoring", len); is->skip(len); return; } flags = is->readU32(); action = flags & clipboardActionMask; if (action & clipboardCaps) { int i; size_t num; rdr::U32 lengths[16]; num = 0; for (i = 0;i < 16;i++) { if (flags & (1 << i)) num++; } if (len < (rdr::S32)(4 + 4*num)) throw Exception("Invalid extended clipboard message"); num = 0; for (i = 0;i < 16;i++) { if (flags & (1 << i)) lengths[num++] = is->readU32(); } handler->handleClipboardCaps(flags, lengths); } else if (action == clipboardProvide) { rdr::ZlibInStream zis; int i; size_t num; size_t lengths[16]; rdr::U8* buffers[16]; zis.setUnderlying(is, len - 4); num = 0; for (i = 0;i < 16;i++) { if (!(flags & 1 << i)) continue; lengths[num] = zis.readU32(); if (lengths[num] > (size_t)maxCutText) { vlog.error("Extended clipboard data too long (%d bytes) - ignoring", (unsigned)lengths[num]); zis.skip(lengths[num]); flags &= ~(1 << i); continue; } buffers[num] = new rdr::U8[lengths[num]]; zis.readBytes(buffers[num], lengths[num]); num++; } zis.removeUnderlying(); handler->handleClipboardProvide(flags, lengths, buffers); num = 0; for (i = 0;i < 16;i++) { if (!(flags & 1 << i)) continue; delete [] buffers[num++]; } } else { switch (action) { case clipboardRequest: handler->handleClipboardRequest(flags); break; case clipboardPeek: handler->handleClipboardPeek(flags); break; case clipboardNotify: handler->handleClipboardNotify(flags); break; default: throw Exception("Invalid extended clipboard action"); } } }
488
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TightDecoder::decodeRect
TightDecoder::decodeRect( const Rect & r , const void * buffer , size_t buflen , const ServerParams & server , ModifiablePixelBuffer * pb)
['r', 'buffer', 'buflen', 'server', 'pb']
void TightDecoder::decodeRect(const Rect& r, const void* buffer, size_t buflen, const ServerParams& server, ModifiablePixelBuffer* pb) { const rdr::U8* bufptr; const PixelFormat& pf = server.pf(); rdr::U8 comp_ctl; bufptr = (const rdr::U8*)buffer; assert(buflen >= 1); comp_ctl = *bufptr; bufptr += 1; buflen -= 1; // Reset zlib streams if we are told by the server to do so. for (int i = 0; i < 4; i++) { if (comp_ctl & 1) { zis[i].reset(); } comp_ctl >>= 1; } // "Fill" compression type. if (comp_ctl == tightFill) { if (pf.is888()) { rdr::U8 pix[4]; assert(buflen >= 3); pf.bufferFromRGB(pix, bufptr, 1); pb->fillRect(pf, r, pix); } else { assert(buflen >= (size_t)pf.bpp/8); pb->fillRect(pf, r, bufptr); } return; } // "JPEG" compression type. if (comp_ctl == tightJpeg) { rdr::U32 len; int stride; rdr::U8 *buf; JpegDecompressor jd; assert(buflen >= 4); memcpy(&len, bufptr, 4); bufptr += 4; buflen -= 4; // We always use direct decoding with JPEG images buf = pb->getBufferRW(r, &stride); jd.decompress(bufptr, len, buf, stride, r, pb->getPF()); pb->commitBufferRW(r); return; } // Quit on unsupported compression type. assert(comp_ctl <= tightMaxSubencoding); // "Basic" compression type. int palSize = 0; rdr::U8 palette[256 * 4]; bool useGradient = false; if ((comp_ctl & tightExplicitFilter) != 0) { rdr::U8 filterId; assert(buflen >= 1); filterId = *bufptr; bufptr += 1; buflen -= 1; switch (filterId) { case tightFilterPalette: assert(buflen >= 1); palSize = *bufptr + 1; bufptr += 1; buflen -= 1; if (pf.is888()) { size_t len = palSize * 3; rdr::U8Array tightPalette(len); assert(buflen >= len); memcpy(tightPalette.buf, bufptr, len); bufptr += len; buflen -= len; pf.bufferFromRGB(palette, tightPalette.buf, palSize); } else { size_t len; len = palSize * pf.bpp/8; assert(buflen >= len); memcpy(palette, bufptr, len); bufptr += len; buflen -= len; } break; case tightFilterGradient: useGradient = true; break; case tightFilterCopy: break; default: assert(false); } } // Determine if the data should be decompressed or just copied. size_t rowSize, dataSize; rdr::U8* netbuf; netbuf = NULL; if (palSize != 0) { if (palSize <= 2) rowSize = (r.width() + 7) / 8; else rowSize = r.width(); } else if (pf.is888()) { rowSize = r.width() * 3; } else { rowSize = r.width() * pf.bpp/8; } dataSize = r.height() * rowSize; if (dataSize < TIGHT_MIN_TO_COMPRESS) assert(buflen >= dataSize); else { rdr::U32 len; int streamId; rdr::MemInStream* ms; assert(buflen >= 4); memcpy(&len, bufptr, 4); bufptr += 4; buflen -= 4; assert(buflen >= len); streamId = comp_ctl & 0x03; ms = new rdr::MemInStream(bufptr, len); zis[streamId].setUnderlying(ms, len); // Allocate buffer and decompress the data netbuf = new rdr::U8[dataSize]; zis[streamId].readBytes(netbuf, dataSize); zis[streamId].removeUnderlying(); delete ms; bufptr = netbuf; buflen = dataSize; } // Time to decode the actual data bool directDecode; rdr::U8* outbuf; int stride; if (pb->getPF().equal(pf)) { // Decode directly into the framebuffer (fast path) directDecode = true; } else { // Decode into an intermediate buffer and use pixel translation directDecode = false; } if (directDecode) outbuf = pb->getBufferRW(r, &stride); else { outbuf = new rdr::U8[r.area() * (pf.bpp/8)]; stride = r.width(); } if (palSize == 0) { // Truecolor data if (useGradient) { if (pf.is888()) FilterGradient24(bufptr, pf, (rdr::U32*)outbuf, stride, r); else { switch (pf.bpp) { case 8: assert(false); break; case 16: FilterGradient(bufptr, pf, (rdr::U16*)outbuf, stride, r); break; case 32: FilterGradient(bufptr, pf, (rdr::U32*)outbuf, stride, r); break; } } } else { // Copy rdr::U8* ptr = outbuf; const rdr::U8* srcPtr = bufptr; int w = r.width(); int h = r.height(); if (pf.is888()) { while (h > 0) { pf.bufferFromRGB(ptr, srcPtr, w); ptr += stride * pf.bpp/8; srcPtr += w * 3; h--; } } else { while (h > 0) { memcpy(ptr, srcPtr, w * pf.bpp/8); ptr += stride * pf.bpp/8; srcPtr += w * pf.bpp/8; h--; } } } } else { // Indexed color switch (pf.bpp) { case 8: FilterPalette((const rdr::U8*)palette, palSize, bufptr, (rdr::U8*)outbuf, stride, r); break; case 16: FilterPalette((const rdr::U16*)palette, palSize, bufptr, (rdr::U16*)outbuf, stride, r); break; case 32: FilterPalette((const rdr::U32*)palette, palSize, bufptr, (rdr::U32*)outbuf, stride, r); break; } } if (directDecode) pb->commitBufferRW(r); else { pb->imageRect(pf, r, outbuf); delete [] outbuf; } delete [] netbuf; }
1229
True
1
CVE-2019-15691
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-672'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Operation on a Resource after Expiration or Release
The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
https://cwe.mitre.org/data/definitions/672.html
0
Pierre Ossman
2019-09-10 11:05:48+02:00
Make ZlibInStream more robust against failures Move the checks around to avoid missing cases where we might access memory that is no longer valid. Also avoid touching the underlying stream implicitly (e.g. via the destructor) as it might also no longer be valid. A malicious server could theoretically use this for remote code execution in the client. Issue found by Pavel Cheremushkin from Kaspersky Lab
d61a767d6842b530ffb532ddd5a3d233119aad40
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rfb::ZRLE_DECODE
rfb::ZRLE_DECODE( const Rect & r , rdr :: InStream * is , rdr :: ZlibInStream * zis , const PixelFormat & pf , ModifiablePixelBuffer * pb)
['r', 'is', 'zis', 'pf', 'pb']
void ZRLE_DECODE (const Rect& r, rdr::InStream* is, rdr::ZlibInStream* zis, const PixelFormat& pf, ModifiablePixelBuffer* pb) { int length = is->readU32(); zis->setUnderlying(is, length); Rect t; PIXEL_T buf[64 * 64]; for (t.tl.y = r.tl.y; t.tl.y < r.br.y; t.tl.y += 64) { t.br.y = __rfbmin(r.br.y, t.tl.y + 64); for (t.tl.x = r.tl.x; t.tl.x < r.br.x; t.tl.x += 64) { t.br.x = __rfbmin(r.br.x, t.tl.x + 64); int mode = zis->readU8(); bool rle = mode & 128; int palSize = mode & 127; PIXEL_T palette[128]; for (int i = 0; i < palSize; i++) { palette[i] = READ_PIXEL(zis); } if (palSize == 1) { PIXEL_T pix = palette[0]; pb->fillRect(pf, t, &pix); continue; } if (!rle) { if (palSize == 0) { // raw #ifdef CPIXEL for (PIXEL_T* ptr = buf; ptr < buf+t.area(); ptr++) { *ptr = READ_PIXEL(zis); } #else zis->readBytes(buf, t.area() * (BPP / 8)); #endif } else { // packed pixels int bppp = ((palSize > 16) ? 8 : ((palSize > 4) ? 4 : ((palSize > 2) ? 2 : 1))); PIXEL_T* ptr = buf; for (int i = 0; i < t.height(); i++) { PIXEL_T* eol = ptr + t.width(); rdr::U8 byte = 0; rdr::U8 nbits = 0; while (ptr < eol) { if (nbits == 0) { byte = zis->readU8(); nbits = 8; } nbits -= bppp; rdr::U8 index = (byte >> nbits) & ((1 << bppp) - 1) & 127; *ptr++ = palette[index]; } } } } else { if (palSize == 0) { // plain RLE PIXEL_T* ptr = buf; PIXEL_T* end = ptr + t.area(); while (ptr < end) { PIXEL_T pix = READ_PIXEL(zis); int len = 1; int b; do { b = zis->readU8(); len += b; } while (b == 255); if (end - ptr < len) { throw Exception ("ZRLE decode error"); } while (len-- > 0) *ptr++ = pix; } } else { // palette RLE PIXEL_T* ptr = buf; PIXEL_T* end = ptr + t.area(); while (ptr < end) { int index = zis->readU8(); int len = 1; if (index & 128) { int b; do { b = zis->readU8(); len += b; } while (b == 255); if (end - ptr < len) { throw Exception ("ZRLE decode error"); } } index &= 127; PIXEL_T pix = palette[index]; while (len-- > 0) *ptr++ = pix; } } } pb->imageRect(pf, t, buf); } } zis->removeUnderlying(); }
721
True
1
CVE-2019-15693
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'name': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-10 15:36:42+02:00
Handle empty Tight gradient rects We always assumed there would be one pixel per row so a rect with a zero width would result in us writing to unknown memory. This could theoretically be used by a malicious server to inject code in to the viewer process. Issue found by Pavel Cheremushkin from Kaspersky Lab.
b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rfb::TightDecoder::FilterGradient
rfb::TightDecoder::FilterGradient( const rdr :: U8 * inbuf , const PixelFormat & pf , PIXEL_T * outbuf , int stride , const Rect & r)
['inbuf', 'pf', 'outbuf', 'stride', 'r']
void TightDecoder::FilterGradient(const rdr::U8* inbuf, const PixelFormat& pf, PIXEL_T* outbuf, int stride, const Rect& r) { int x, y, c; static rdr::U8 prevRow[TIGHT_MAX_WIDTH*3]; static rdr::U8 thisRow[TIGHT_MAX_WIDTH*3]; rdr::U8 pix[3]; int est[3]; memset(prevRow, 0, sizeof(prevRow)); // Set up shortcut variables int rectHeight = r.height(); int rectWidth = r.width(); for (y = 0; y < rectHeight; y++) { /* First pixel in a row */ pf.rgbFromBuffer(pix, &inbuf[y*rectWidth], 1); for (c = 0; c < 3; c++) pix[c] += prevRow[c]; memcpy(thisRow, pix, sizeof(pix)); pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride], pix, 1); /* Remaining pixels of a row */ for (x = 1; x < rectWidth; x++) { for (c = 0; c < 3; c++) { est[c] = prevRow[x*3+c] + pix[c] - prevRow[(x-1)*3+c]; if (est[c] > 255) { est[c] = 255; } else if (est[c] < 0) { est[c] = 0; } } pf.rgbFromBuffer(pix, &inbuf[y*rectWidth+x], 1); for (c = 0; c < 3; c++) pix[c] += est[c]; memcpy(&thisRow[x*3], pix, sizeof(pix)); pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride+x], pix, 1); } memcpy(prevRow, thisRow, sizeof(prevRow)); } }
389
True
1
CVE-2019-15693
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'name': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-01-21T22:15Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-10 15:36:42+02:00
Handle empty Tight gradient rects We always assumed there would be one pixel per row so a rect with a zero width would result in us writing to unknown memory. This could theoretically be used by a malicious server to inject code in to the viewer process. Issue found by Pavel Cheremushkin from Kaspersky Lab.
b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rfb::TightDecoder::FilterGradient24
rfb::TightDecoder::FilterGradient24( const rdr :: U8 * inbuf , const PixelFormat & pf , PIXEL_T * outbuf , int stride , const Rect & r)
['inbuf', 'pf', 'outbuf', 'stride', 'r']
TightDecoder::FilterGradient24(const rdr::U8 *inbuf, const PixelFormat& pf, PIXEL_T* outbuf, int stride, const Rect& r) { int x, y, c; rdr::U8 prevRow[TIGHT_MAX_WIDTH*3]; rdr::U8 thisRow[TIGHT_MAX_WIDTH*3]; rdr::U8 pix[3]; int est[3]; memset(prevRow, 0, sizeof(prevRow)); // Set up shortcut variables int rectHeight = r.height(); int rectWidth = r.width(); for (y = 0; y < rectHeight; y++) { /* First pixel in a row */ for (c = 0; c < 3; c++) { pix[c] = inbuf[y*rectWidth*3+c] + prevRow[c]; thisRow[c] = pix[c]; } pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride], pix, 1); /* Remaining pixels of a row */ for (x = 1; x < rectWidth; x++) { for (c = 0; c < 3; c++) { est[c] = prevRow[x*3+c] + pix[c] - prevRow[(x-1)*3+c]; if (est[c] > 0xff) { est[c] = 0xff; } else if (est[c] < 0) { est[c] = 0; } pix[c] = inbuf[(y*rectWidth+x)*3+c] + est[c]; thisRow[x*3+c] = pix[c]; } pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride+x], pix, 1); } memcpy(prevRow, thisRow, sizeof(prevRow)); } }
360
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdInStream::FdInStream
FdInStream::FdInStream( int fd_ , FdInStreamBlockCallback * blockCallback_ , int bufSize_)
['fd_', 'blockCallback_', 'bufSize_']
FdInStream::FdInStream(int fd_, FdInStreamBlockCallback* blockCallback_, int bufSize_) : fd(fd_), timeoutms(0), blockCallback(blockCallback_), timing(false), timeWaitedIn100us(5), timedKbits(0), bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0) { ptr = end = start = new U8[bufSize]; }
72
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdInStream::FdInStream
FdInStream::FdInStream( int fd_ , int timeoutms_ , int bufSize_ , bool closeWhenDone_)
['fd_', 'timeoutms_', 'bufSize_', 'closeWhenDone_']
FdInStream::FdInStream(int fd_, int timeoutms_, int bufSize_, bool closeWhenDone_) : fd(fd_), closeWhenDone(closeWhenDone_), timeoutms(timeoutms_), blockCallback(0), timing(false), timeWaitedIn100us(5), timedKbits(0), bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0) { ptr = end = start = new U8[bufSize]; }
79
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdInStream::overrun
FdInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int FdInStream::overrun(int itemSize, int nItems, bool wait) { if (itemSize > bufSize) throw Exception("FdInStream overrun: max itemSize exceeded"); if (end - ptr != 0) memmove(start, ptr, end - ptr); offset += ptr - start; end -= ptr - start; ptr = start; int bytes_to_read; while (end < start + itemSize) { bytes_to_read = start + bufSize - end; if (!timing) { // When not timing, we must be careful not to read too much // extra data into the buffer. Otherwise, the line speed // estimation might stay at zero for a long time: All reads // during timing=1 can be satisfied without calling // readWithTimeoutOrCallback. However, reading only 1 or 2 bytes // bytes is ineffecient. bytes_to_read = vncmin(bytes_to_read, vncmax(itemSize*nItems, 8)); } int n = readWithTimeoutOrCallback((U8*)end, bytes_to_read, wait); if (n == 0) return 0; end += n; } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
158
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdInStream::pos
FdInStream::pos()
[]
int FdInStream::pos() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdInStream::readBytes
FdInStream::readBytes( void * data , int length)
['data', 'length']
void FdInStream::readBytes(void* data, int length) { if (length < MIN_BULK_SIZE) { InStream::readBytes(data, length); return; } U8* dataPtr = (U8*)data; int n = end - ptr; if (n > length) n = length; memcpy(dataPtr, ptr, n); dataPtr += n; length -= n; ptr += n; while (length > 0) { n = readWithTimeoutOrCallback(dataPtr, length); dataPtr += n; length -= n; offset += n; } }
109
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdInStream::readWithTimeoutOrCallback
FdInStream::readWithTimeoutOrCallback( void * buf , int len , bool wait)
['buf', 'len', 'wait']
int FdInStream::readWithTimeoutOrCallback(void* buf, int len, bool wait) { struct timeval before, after; if (timing) gettimeofday(&before, 0); int n; while (true) { do { fd_set fds; struct timeval tv; struct timeval* tvp = &tv; if (!wait) { tv.tv_sec = tv.tv_usec = 0; } else if (timeoutms != -1) { tv.tv_sec = timeoutms / 1000; tv.tv_usec = (timeoutms % 1000) * 1000; } else { tvp = 0; } FD_ZERO(&fds); FD_SET(fd, &fds); n = select(fd+1, &fds, 0, 0, tvp); } while (n < 0 && errno == EINTR); if (n > 0) break; if (n < 0) throw SystemException("select",errno); if (!wait) return 0; if (!blockCallback) throw TimedOut(); blockCallback->blockCallback(); } do { n = ::recv(fd, (char*)buf, len, 0); } while (n < 0 && errno == EINTR); if (n < 0) throw SystemException("read",errno); if (n == 0) throw EndOfStream(); if (timing) { gettimeofday(&after, 0); int newTimeWaited = ((after.tv_sec - before.tv_sec) * 10000 + (after.tv_usec - before.tv_usec) / 100); int newKbits = n * 8 / 1000; // limit rate to between 10kbit/s and 40Mbit/s if (newTimeWaited > newKbits*1000) newTimeWaited = newKbits*1000; if (newTimeWaited < newKbits/4) newTimeWaited = newKbits/4; timeWaitedIn100us += newTimeWaited; timedKbits += newKbits; } return n; }
352
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdOutStream::FdOutStream
FdOutStream::FdOutStream( int fd_ , bool blocking_ , int timeoutms_ , int bufSize_)
['fd_', 'blocking_', 'timeoutms_', 'bufSize_']
FdOutStream::FdOutStream(int fd_, bool blocking_, int timeoutms_, int bufSize_) : fd(fd_), blocking(blocking_), timeoutms(timeoutms_), bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0) { ptr = start = sentUpTo = new U8[bufSize]; end = start + bufSize; gettimeofday(&lastWrite, NULL); }
73
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdOutStream::flush
FdOutStream::flush()
[]
void FdOutStream::flush() { while (sentUpTo < ptr) { int n = writeWithTimeout((const void*) sentUpTo, ptr - sentUpTo, blocking? timeoutms : 0); // Timeout? if (n == 0) { // If non-blocking then we're done here if (!blocking) break; throw TimedOut(); } sentUpTo += n; offset += n; } // Managed to flush everything? if (sentUpTo == ptr) ptr = sentUpTo = start; }
78
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdOutStream::length
FdOutStream::length()
[]
int FdOutStream::length() { return offset + ptr - sentUpTo; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdOutStream::overrun
FdOutStream::overrun( int itemSize , int nItems)
['itemSize', 'nItems']
int FdOutStream::overrun(int itemSize, int nItems) { if (itemSize > bufSize) throw Exception("FdOutStream overrun: max itemSize exceeded"); // First try to get rid of the data we have flush(); // Still not enough space? if (itemSize > end - ptr) { // Can we shuffle things around? // (don't do this if it gains us less than 25%) if ((sentUpTo - start > bufSize / 4) && (itemSize < bufSize - (ptr - sentUpTo))) { memmove(start, sentUpTo, ptr - sentUpTo); ptr = start + (ptr - sentUpTo); sentUpTo = start; } else { // Have to get rid of more data, so turn off non-blocking // for a bit... bool realBlocking; realBlocking = blocking; blocking = true; flush(); blocking = realBlocking; } } // Can we fit all the items asked for? if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
134
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FdOutStream::writeWithTimeout
FdOutStream::writeWithTimeout( const void * data , int length , int timeoutms)
['data', 'length', 'timeoutms']
int FdOutStream::writeWithTimeout(const void* data, int length, int timeoutms) { int n; do { fd_set fds; struct timeval tv; struct timeval* tvp = &tv; if (timeoutms != -1) { tv.tv_sec = timeoutms / 1000; tv.tv_usec = (timeoutms % 1000) * 1000; } else { tvp = NULL; } FD_ZERO(&fds); FD_SET(fd, &fds); n = select(fd+1, 0, &fds, 0, tvp); } while (n < 0 && errno == EINTR); if (n < 0) throw SystemException("select", errno); if (n == 0) return 0; do { // select only guarantees that you can write SO_SNDLOWAT without // blocking, which is normally 1. Use MSG_DONTWAIT to avoid // blocking, when possible. #ifndef MSG_DONTWAIT n = ::send(fd, (const char*)data, length, 0); #else n = ::send(fd, (const char*)data, length, MSG_DONTWAIT); #endif } while (n < 0 && (errno == EINTR)); if (n < 0) throw SystemException("write", errno); gettimeofday(&lastWrite, NULL); return n; }
219
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FileInStream::overrun
FileInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int FileInStream::overrun(int itemSize, int nItems, bool wait) { if (itemSize > (int)sizeof(b)) throw Exception("FileInStream overrun: max itemSize exceeded"); if (end - ptr != 0) memmove(b, ptr, end - ptr); end -= ptr - b; ptr = b; while (end < b + itemSize) { size_t n = fread((U8 *)end, b + sizeof(b) - end, 1, file); if (n == 0) { if (ferror(file)) throw SystemException("fread", errno); if (feof(file)) throw EndOfStream(); return 0; } end += b + sizeof(b) - end; } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
169
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
FileInStream::pos
FileInStream::pos()
[]
int FileInStream::pos() { if (!file) throw Exception("File is not open"); return ftell(file) + ptr - b; }
28
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexInStream::HexInStream
HexInStream::HexInStream( InStream & is , int bufSize_)
['is', 'bufSize_']
HexInStream::HexInStream(InStream& is, int bufSize_) : bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_LEN), offset(0), in_stream(is) { ptr = end = start = new U8[bufSize]; }
44
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexInStream::hexStrToBin
HexInStream::hexStrToBin( const char * s , char ** data , int * length)
['s', 'data', 'length']
bool HexInStream::hexStrToBin(const char* s, char** data, int* length) { int l=strlen(s); if ((l % 2) == 0) { delete [] *data; *data = 0; *length = 0; if (l == 0) return true; *data = new char[l/2]; *length = l/2; for(int i=0;i<l;i+=2) { int byte = 0; if (!readHexAndShift(s[i], &byte) || !readHexAndShift(s[i+1], &byte)) goto decodeError; (*data)[i/2] = byte; } return true; } decodeError: delete [] *data; *data = 0; *length = 0; return false; }
171
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexInStream::overrun
HexInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int HexInStream::overrun(int itemSize, int nItems, bool wait) { if (itemSize > bufSize) throw Exception("HexInStream overrun: max itemSize exceeded"); if (end - ptr != 0) memmove(start, ptr, end - ptr); end -= ptr - start; offset += ptr - start; ptr = start; while (end < ptr + itemSize) { int n = in_stream.check(2, 1, wait); if (n == 0) return 0; const U8* iptr = in_stream.getptr(); const U8* eptr = in_stream.getend(); int length = min((eptr - iptr)/2, start + bufSize - end); U8* optr = (U8*) end; for (int i=0; i<length; i++) { int v = 0; readHexAndShift(iptr[i*2], &v); readHexAndShift(iptr[i*2+1], &v); optr[i] = v; } in_stream.setptr(iptr + length*2); end += length; } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
241
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexInStream::pos
HexInStream::pos()
[]
int HexInStream::pos() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexOutStream::HexOutStream
HexOutStream::HexOutStream( OutStream & os , int buflen)
['os', 'buflen']
HexOutStream::HexOutStream(OutStream& os, int buflen) : out_stream(os), offset(0), bufSize(buflen ? buflen : DEFAULT_BUF_LEN) { if (bufSize % 2) bufSize--; ptr = start = new U8[bufSize]; end = start + bufSize; }
57
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexOutStream::binToHexStr
HexOutStream::binToHexStr( const char * data , int length)
['data', 'length']
char* HexOutStream::binToHexStr(const char* data, int length) { char* buffer = new char[length*2+1]; for (int i=0; i<length; i++) { buffer[i*2] = intToHex((data[i] >> 4) & 15); buffer[i*2+1] = intToHex((data[i] & 15)); if (!buffer[i*2] || !buffer[i*2+1]) { delete [] buffer; return 0; } } buffer[length*2] = 0; return buffer; }
129
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexOutStream::length
HexOutStream::length()
[]
int HexOutStream::length() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexOutStream::overrun
HexOutStream::overrun( int itemSize , int nItems)
['itemSize', 'nItems']
HexOutStream::overrun(int itemSize, int nItems) { if (itemSize > bufSize) throw Exception("HexOutStream overrun: max itemSize exceeded"); writeBuffer(); if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
51
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
HexOutStream::writeBuffer
HexOutStream::writeBuffer()
[]
HexOutStream::writeBuffer() { U8* pos = start; while (pos != ptr) { out_stream.check(2); U8* optr = out_stream.getptr(); U8* oend = out_stream.getend(); int length = min(ptr-pos, (oend-optr)/2); for (int i=0; i<length; i++) { optr[i*2] = intToHex((pos[i] >> 4) & 0xf); optr[i*2+1] = intToHex(pos[i] & 0xf); } out_stream.setptr(optr + length*2); pos += length; } offset += ptr - start; ptr = start; }
148
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
min
min( int a , int b)
['a', 'b']
static inline int min(int a, int b) {return a<b ? a : b;}
19
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::InStream::check
rdr::InStream::check( int itemSize , int nItems = 1 , bool wait = true)
['itemSize', 'nItems', 'wait']
inline int check(int itemSize, int nItems=1, bool wait=true) { if (ptr + itemSize * nItems > end) { if (ptr + itemSize > end) return overrun(itemSize, nItems, wait); nItems = (end - ptr) / itemSize; } return nItems; }
60
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::InStream::checkNoWait
rdr::InStream::checkNoWait( int length)
['length']
inline bool checkNoWait(int length) { return check(length, 1, false)!=0; }
19
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::InStream::readBytes
rdr::InStream::readBytes( void * data , int length)
['data', 'length']
void readBytes(void* data, int length) { U8* dataPtr = (U8*)data; U8* dataEnd = dataPtr + length; while (dataPtr < dataEnd) { int n = check(1, dataEnd - dataPtr); memcpy(dataPtr, ptr, n); ptr += n; dataPtr += n; } }
66
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::InStream::skip
rdr::InStream::skip( int bytes)
['bytes']
inline void skip(int bytes) { while (bytes > 0) { int n = check(1, bytes); ptr += n; bytes -= n; } }
33
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemInStream::MemInStream
rdr::MemInStream::MemInStream( const void * data , int len , bool deleteWhenDone_ = false)
['data', 'len', 'deleteWhenDone_']
MemInStream(const void* data, int len, bool deleteWhenDone_=false) : start((const U8*)data), deleteWhenDone(deleteWhenDone_) { ptr = start; end = start + len; }
42
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemInStream::overrun
rdr::MemInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int overrun(int itemSize, int nItems, bool wait) { throw EndOfStream(); }
18
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemInStream::pos
rdr::MemInStream::pos()
[]
int pos() { return ptr - start; }
10
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemInStream::reposition
rdr::MemInStream::reposition( int pos)
['pos']
void reposition(int pos) { ptr = start + pos; }
13
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemOutStream::length
rdr::MemOutStream::length()
[]
int length() { return ptr - start; }
10
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemOutStream::overrun
rdr::MemOutStream::overrun( int itemSize , int nItems)
['itemSize', 'nItems']
int overrun(int itemSize, int nItems) { int len = ptr - start + itemSize * nItems; if (len < (end - start) * 2) len = (end - start) * 2; U8* newStart = new U8[len]; memcpy(newStart, start, ptr - start); ptr = newStart + (ptr - start); delete [] start; start = newStart; end = newStart + len; return nItems; }
92
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemOutStream::reposition
rdr::MemOutStream::reposition( int pos)
['pos']
void reposition(int pos) { ptr = start + pos; }
13
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::MemOutStream::writeBytes
rdr::MemOutStream::writeBytes( const void * data , int length)
['data', 'length']
void writeBytes(const void* data, int length) { check(length); memcpy(ptr, data, length); ptr += length; }
30
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::OutStream::check
rdr::OutStream::check( int itemSize , int nItems = 1)
['itemSize', 'nItems']
inline int check(int itemSize, int nItems=1) { if (ptr + itemSize * nItems > end) { if (ptr + itemSize > end) return overrun(itemSize, nItems); nItems = (end - ptr) / itemSize; } return nItems; }
53
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::OutStream::copyBytes
rdr::OutStream::copyBytes( InStream * is , int length)
['is', 'length']
void copyBytes(InStream* is, int length) { while (length > 0) { int n = check(1, length); is->readBytes(ptr, n); ptr += n; length -= n; } }
46
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::OutStream::pad
rdr::OutStream::pad( int bytes)
['bytes']
inline void pad(int bytes) { while (bytes-- > 0) writeU8(0); }
19
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::OutStream::skip
rdr::OutStream::skip( int bytes)
['bytes']
inline void skip(int bytes) { while (bytes > 0) { int n = check(1, bytes); ptr += n; bytes -= n; } }
33
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rdr::OutStream::writeBytes
rdr::OutStream::writeBytes( const void * data , int length)
['data', 'length']
void writeBytes(const void* data, int length) { const U8* dataPtr = (const U8*)data; const U8* dataEnd = dataPtr + length; while (dataPtr < dataEnd) { int n = check(1, dataEnd - dataPtr); memcpy(ptr, dataPtr, n); ptr += n; dataPtr += n; } }
70
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSInStream::overrun
TLSInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int TLSInStream::overrun(int itemSize, int nItems, bool wait) { if (itemSize > bufSize) throw Exception("TLSInStream overrun: max itemSize exceeded"); if (end - ptr != 0) memmove(start, ptr, end - ptr); offset += ptr - start; end -= ptr - start; ptr = start; while (end < start + itemSize) { int n = readTLS((U8*) end, start + bufSize - end, wait); if (!wait && n == 0) return 0; end += n; } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
131
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSInStream::pos
TLSInStream::pos()
[]
int TLSInStream::pos() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSInStream::readTLS
TLSInStream::readTLS( U8 * buf , int len , bool wait)
['buf', 'len', 'wait']
int TLSInStream::readTLS(U8* buf, int len, bool wait) { int n; n = in->check(1, 1, wait); if (n == 0) return 0; n = gnutls_record_recv(session, (void *) buf, len); if (n == GNUTLS_E_INTERRUPTED || n == GNUTLS_E_AGAIN) return 0; if (n < 0) throw TLSException("readTLS", n); return n; }
86
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSOutStream::flush
TLSOutStream::flush()
[]
void TLSOutStream::flush() { U8* sentUpTo = start; while (sentUpTo < ptr) { int n = writeTLS(sentUpTo, ptr - sentUpTo); sentUpTo += n; offset += n; } ptr = start; out->flush(); }
51
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSOutStream::length
TLSOutStream::length()
[]
int TLSOutStream::length() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSOutStream::overrun
TLSOutStream::overrun( int itemSize , int nItems)
['itemSize', 'nItems']
int TLSOutStream::overrun(int itemSize, int nItems) { if (itemSize > bufSize) throw Exception("TLSOutStream overrun: max itemSize exceeded"); flush(); if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
51
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
TLSOutStream::writeTLS
TLSOutStream::writeTLS( const U8 * data , int length)
['data', 'length']
int TLSOutStream::writeTLS(const U8* data, int length) { int n; n = gnutls_record_send(session, data, length); if (n == GNUTLS_E_INTERRUPTED || n == GNUTLS_E_AGAIN) return 0; if (n < 0) throw TLSException("writeTLS", n); return n; }
58
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::ZlibInStream
ZlibInStream::ZlibInStream( int bufSize_)
['bufSize_']
ZlibInStream::ZlibInStream(int bufSize_) : underlying(0), bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0), zs(NULL), bytesIn(0) { ptr = end = start = new U8[bufSize]; init(); }
54
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::decompress
ZlibInStream::decompress( bool wait)
['wait']
bool ZlibInStream::decompress(bool wait) { if (!underlying) throw Exception("ZlibInStream overrun: no underlying stream"); zs->next_out = (U8*)end; zs->avail_out = start + bufSize - end; int n = underlying->check(1, 1, wait); if (n == 0) return false; zs->next_in = (U8*)underlying->getptr(); zs->avail_in = underlying->getend() - underlying->getptr(); if ((int)zs->avail_in > bytesIn) zs->avail_in = bytesIn; int rc = inflate(zs, Z_SYNC_FLUSH); if (rc != Z_OK) { throw Exception("ZlibInStream: inflate failed"); } bytesIn -= zs->next_in - underlying->getptr(); end = zs->next_out; underlying->setptr(zs->next_in); return true; }
164
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::overrun
ZlibInStream::overrun( int itemSize , int nItems , bool wait)
['itemSize', 'nItems', 'wait']
int ZlibInStream::overrun(int itemSize, int nItems, bool wait) { if (itemSize > bufSize) throw Exception("ZlibInStream overrun: max itemSize exceeded"); if (end - ptr != 0) memmove(start, ptr, end - ptr); offset += ptr - start; end -= ptr - start; ptr = start; while (end - ptr < itemSize) { if (!decompress(wait)) return 0; } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
106
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::pos
ZlibInStream::pos()
[]
int ZlibInStream::pos() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibInStream::setUnderlying
ZlibInStream::setUnderlying( InStream * is , int bytesIn_)
['is', 'bytesIn_']
void ZlibInStream::setUnderlying(InStream* is, int bytesIn_) { underlying = is; bytesIn = bytesIn_; ptr = end = start; }
27
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibOutStream::ZlibOutStream
ZlibOutStream::ZlibOutStream( OutStream * os , int bufSize_ , int compressLevel)
['os', 'bufSize_', 'compressLevel']
ZlibOutStream::ZlibOutStream(OutStream* os, int bufSize_, int compressLevel) : underlying(os), compressionLevel(compressLevel), newLevel(compressLevel), bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0) { zs = new z_stream; zs->zalloc = Z_NULL; zs->zfree = Z_NULL; zs->opaque = Z_NULL; zs->next_in = Z_NULL; zs->avail_in = 0; if (deflateInit(zs, compressLevel) != Z_OK) { delete zs; throw Exception("ZlibOutStream: deflateInit failed"); } ptr = start = new U8[bufSize]; end = start + bufSize; }
118
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibOutStream::length
ZlibOutStream::length()
[]
int ZlibOutStream::length() { return offset + ptr - start; }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ZlibOutStream::overrun
ZlibOutStream::overrun( int itemSize , int nItems)
['itemSize', 'nItems']
int ZlibOutStream::overrun(int itemSize, int nItems) { #ifdef ZLIBOUT_DEBUG vlog.debug("overrun"); #endif if (itemSize > bufSize) throw Exception("ZlibOutStream overrun: max itemSize exceeded"); checkCompressionLevel(); while (end - ptr < itemSize) { zs->next_in = start; zs->avail_in = ptr - start; deflate(Z_NO_FLUSH); // output buffer not full if (zs->avail_in == 0) { offset += ptr - start; ptr = start; } else { // but didn't consume all the data? try shifting what's left to the // start of the buffer. vlog.info("z out buf not full, but in data not consumed"); memmove(start, zs->next_in, ptr - zs->next_in); offset += zs->next_in - start; ptr -= zs->next_in - start; } } if (itemSize * nItems > end - ptr) nItems = (end - ptr) / itemSize; return nItems; }
148
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
BinaryParameter::BinaryParameter
BinaryParameter::BinaryParameter( const char * name_ , const char * desc_ , const void * v , int l , ConfigurationObject co)
['name_', 'desc_', 'v', 'l', 'co']
BinaryParameter::BinaryParameter(const char* name_, const char* desc_, const void* v, int l, ConfigurationObject co) : VoidParameter(name_, desc_, co), value(0), length(0), def_value((char*)v), def_length(l) { if (l) { value = new char[l]; length = l; memcpy(value, v, l); } }
87
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
BinaryParameter::getData
BinaryParameter::getData( void ** data_ , int * length_) const
['data_', 'length_']
void BinaryParameter::getData(void** data_, int* length_) const { LOCK_CONFIG; if (length_) *length_ = length; if (data_) { *data_ = new char[length]; memcpy(*data_, value, length); } }
51
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
BinaryParameter::setParam
BinaryParameter::setParam( const void * v , int len)
['v', 'len']
void BinaryParameter::setParam(const void* v, int len) { LOCK_CONFIG; if (immutable) return; vlog.debug("set %s(Binary)", getName()); delete [] value; value = 0; if (len) { value = new char[len]; length = len; memcpy(value, v, len); } }
69
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ObfuscatedPasswd::ObfuscatedPasswd
ObfuscatedPasswd::ObfuscatedPasswd( const PlainPasswd & plainPwd)
['plainPwd']
ObfuscatedPasswd::ObfuscatedPasswd(const PlainPasswd& plainPwd) : CharArray(8), length(8) { int l = strlen(plainPwd.buf), i; for (i=0; i<8; i++) buf[i] = i<l ? plainPwd.buf[i] : 0; deskey(d3desObfuscationKey, EN0); des((rdr::U8*)buf, (rdr::U8*)buf); }
90
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
ObfuscatedPasswd::ObfuscatedPasswd
ObfuscatedPasswd::ObfuscatedPasswd( int len)
['len']
ObfuscatedPasswd::ObfuscatedPasswd(int len) : CharArray(len), length(len) { }
19
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
PlainPasswd::PlainPasswd
PlainPasswd::PlainPasswd( int len)
['len']
PlainPasswd::PlainPasswd(int len) : CharArray(len) { }
14
True
1
CVE-2019-15694
False
False
False
False
AV:N/AC:L/Au:S/C:P/I:P/A:P
NETWORK
LOW
SINGLE
PARTIAL
PARTIAL
PARTIAL
6.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
NETWORK
LOW
HIGH
NONE
UNCHANGED
HIGH
HIGH
HIGH
7.2
HIGH
1.2
5.9
False
[{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-787'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}]
2020-10-16T20:00Z
2019-12-26T15:15Z
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
https://cwe.mitre.org/data/definitions/787.html
0
Pierre Ossman
2019-09-23 11:00:17+02:00
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
0943c006c7d900dfc0281639e992791d6c567438
False
CendioOssman/tigervnc
null
2014-07-03 12:14:02
2022-08-25 12:52:23
null
CendioOssman
8.0
1.0
rfb::CharArray::CharArray
rfb::CharArray::CharArray( int len)
['len']
CharArray(int len) { buf = new char[len](); }
17
True
1