cve_id
stringlengths 13
16
| obtain_all_privilege
stringclasses 3
values | obtain_user_privilege
stringclasses 2
values | obtain_other_privilege
stringclasses 2
values | user_interaction_required
stringclasses 3
values | cvss2_vector_string
stringclasses 106
values | cvss2_access_vector
stringclasses 4
values | cvss2_access_complexity
stringclasses 4
values | cvss2_authentication
stringclasses 3
values | cvss2_confidentiality_impact
stringclasses 4
values | cvss2_integrity_impact
stringclasses 4
values | cvss2_availability_impact
stringclasses 4
values | cvss2_base_score
stringclasses 50
values | cvss3_vector_string
stringclasses 226
values | cvss3_attack_vector
stringclasses 5
values | cvss3_attack_complexity
stringclasses 3
values | cvss3_privileges_required
stringclasses 4
values | cvss3_user_interaction
stringclasses 3
values | cvss3_scope
stringclasses 3
values | cvss3_confidentiality_impact
stringclasses 4
values | cvss3_integrity_impact
stringclasses 4
values | cvss3_availability_impact
stringclasses 4
values | cvss3_base_score
stringclasses 55
values | cvss3_base_severity
stringclasses 5
values | exploitability_score
stringclasses 22
values | impact_score
stringclasses 15
values | ac_insuf_info
stringclasses 3
values | reference_json
stringlengths 221
23.3k
| problemtype_json
stringclasses 200
values | severity
stringclasses 4
values | cve_nodes
stringlengths 2
33.1k
| cve_description
stringlengths 64
1.99k
| cve_last_modified_date
stringlengths 17
17
| cve_published_date
stringlengths 17
17
| cwe_name
stringclasses 125
values | cwe_description
stringclasses 124
values | cwe_extended_description
stringclasses 95
values | cwe_url
stringclasses 124
values | cwe_is_category
int64 0
1
| commit_author
stringlengths 0
34
| commit_author_date
stringlengths 25
25
| commit_msg
stringlengths 0
13.3k
| commit_hash
stringlengths 40
40
| commit_is_merge
stringclasses 1
value | repo_name
stringclasses 467
values | repo_description
stringclasses 459
values | repo_date_created
stringclasses 467
values | repo_date_last_push
stringclasses 467
values | repo_homepage
stringclasses 294
values | repo_owner
stringclasses 470
values | repo_stars
stringclasses 406
values | repo_forks
stringclasses 352
values | function_name
stringlengths 3
120
| function_signature
stringlengths 6
640
| function_parameters
stringlengths 2
302
| function
stringlengths 12
114k
| function_token_count
stringlengths 1
5
| function_before_change
stringclasses 1
value | labels
int64 1
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Extensions::TransportSockets::Tls::TEST_P | Envoy::Extensions::TransportSockets::Tls::TEST_P( SslSocketTest , Ipv6San) | ['SslSocketTest', 'Ipv6San'] | TEST_P(SslSocketTest, Ipv6San) {
const std::string client_ctx_yaml = R"EOF(
common_tls_context:
validation_context:
trusted_ca:
filename: "{{ test_rundir }}/test/config/integration/certs/upstreamcacert.pem"
match_subject_alt_names:
exact: "::1"
)EOF";
const std::string server_ctx_yaml = R"EOF(
common_tls_context:
tls_certificates:
certificate_chain:
filename: "{{ test_rundir }}/test/config/integration/certs/upstreamlocalhostcert.pem"
private_key:
filename: "{{ test_rundir }}/test/config/integration/certs/upstreamlocalhostkey.pem"
)EOF";
TestUtilOptions test_options(client_ctx_yaml, server_ctx_yaml, true, GetParam());
testUtil(test_options);
} | 102 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::AdsIntegrationTest::initializeAds | Envoy::AdsIntegrationTest::initializeAds( const bool rate_limiting) | ['rate_limiting'] | void AdsIntegrationTest::initializeAds(const bool rate_limiting) {
config_helper_.addRuntimeOverride("envoy.restart_features.explicit_wildcard_resource",
oldDssOrNewDss() == OldDssOrNewDss::Old ? "false" : "true");
config_helper_.addConfigModifier([this, &rate_limiting](
envoy::config::bootstrap::v3::Bootstrap& bootstrap) {
auto* ads_config = bootstrap.mutable_dynamic_resources()->mutable_ads_config();
if (rate_limiting) {
ads_config->mutable_rate_limit_settings();
}
auto* grpc_service = ads_config->add_grpc_services();
setGrpcService(*grpc_service, "ads_cluster", xds_upstream_->localAddress());
auto* ads_cluster = bootstrap.mutable_static_resources()->add_clusters();
ads_cluster->MergeFrom(bootstrap.static_resources().clusters()[0]);
ads_cluster->set_name("ads_cluster");
envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext context;
auto* validation_context = context.mutable_common_tls_context()->mutable_validation_context();
validation_context->mutable_trusted_ca()->set_filename(
TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcacert.pem"));
validation_context->add_match_subject_alt_names()->set_suffix("lyft.com");
if (clientType() == Grpc::ClientType::GoogleGrpc) {
auto* google_grpc = grpc_service->mutable_google_grpc();
auto* ssl_creds = google_grpc->mutable_channel_credentials()->mutable_ssl_credentials();
ssl_creds->mutable_root_certs()->set_filename(
TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcacert.pem"));
}
ads_cluster->mutable_transport_socket()->set_name("envoy.transport_sockets.tls");
ads_cluster->mutable_transport_socket()->mutable_typed_config()->PackFrom(context);
});
HttpIntegrationTest::initialize();
if (xds_stream_ == nullptr) {
createXdsConnection();
AssertionResult result = xds_connection_->waitForNewStream(*dispatcher_, xds_stream_);
RELEASE_ASSERT(result, result.message());
xds_stream_->startGrpcStream();
}
} | 327 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Ssl::initializeUpstreamTlsContextConfig | Envoy::Ssl::initializeUpstreamTlsContextConfig( const ClientSslTransportOptions & options , envoy :: extensions :: transport_sockets :: tls :: v3 :: UpstreamTlsContext & tls_context) | ['options', 'tls_context'] | void initializeUpstreamTlsContextConfig(
const ClientSslTransportOptions& options,
envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext& tls_context) {
std::string yaml_plain = R"EOF(
common_tls_context:
validation_context:
trusted_ca:
filename: "{{ test_rundir }}/test/config/integration/certs/cacert.pem"
)EOF";
if (options.client_ecdsa_cert_) {
yaml_plain += R"EOF(
tls_certificates:
certificate_chain:
filename: "{{ test_rundir }}/test/config/integration/certs/client_ecdsacert.pem"
private_key:
filename: "{{ test_rundir }}/test/config/integration/certs/client_ecdsakey.pem"
)EOF";
} else if (options.use_expired_spiffe_cert_) {
yaml_plain += R"EOF(
tls_certificates:
certificate_chain:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/expired_spiffe_san_cert.pem"
private_key:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/expired_spiffe_san_key.pem"
)EOF";
} else {
yaml_plain += R"EOF(
tls_certificates:
certificate_chain:
filename: "{{ test_rundir }}/test/config/integration/certs/clientcert.pem"
private_key:
filename: "{{ test_rundir }}/test/config/integration/certs/clientkey.pem"
)EOF";
}
TestUtility::loadFromYaml(TestEnvironment::substitute(yaml_plain), tls_context);
auto* common_context = tls_context.mutable_common_tls_context();
if (options.alpn_) {
common_context->add_alpn_protocols(Http::Utility::AlpnNames::get().Http2);
common_context->add_alpn_protocols(Http::Utility::AlpnNames::get().Http11);
common_context->add_alpn_protocols(Http::Utility::AlpnNames::get().Http3);
}
if (!options.san_.empty()) {
common_context->mutable_validation_context()->add_match_subject_alt_names()->set_exact(
options.san_);
}
for (const std::string& cipher_suite : options.cipher_suites_) {
common_context->mutable_tls_params()->add_cipher_suites(cipher_suite);
}
if (!options.sni_.empty()) {
tls_context.set_sni(options.sni_);
}
common_context->mutable_tls_params()->set_tls_minimum_protocol_version(options.tls_version_);
common_context->mutable_tls_params()->set_tls_maximum_protocol_version(options.tls_version_);
} | 383 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Xfcc::XfccIntegrationTest::createClientSslContext | Envoy::Xfcc::XfccIntegrationTest::createClientSslContext( bool mtls) | ['mtls'] | Network::TransportSocketFactoryPtr XfccIntegrationTest::createClientSslContext(bool mtls) {
const std::string yaml_tls = R"EOF(
common_tls_context:
validation_context:
trusted_ca:
filename: {{ test_rundir }}/test/config/integration/certs/cacert.pem
match_subject_alt_names:
exact: "spiffe://lyft.com/backend-team"
exact: "lyft.com"
exact: "www.lyft.com"
)EOF";
const std::string yaml_mtls = R"EOF(
common_tls_context:
validation_context:
trusted_ca:
filename: {{ test_rundir }}/test/config/integration/certs/cacert.pem
match_subject_alt_names:
exact: "spiffe://lyft.com/backend-team"
exact: "lyft.com"
exact: "www.lyft.com"
tls_certificates:
certificate_chain:
filename: {{ test_rundir }}/test/config/integration/certs/clientcert.pem
private_key:
filename: {{ test_rundir }}/test/config/integration/certs/clientkey.pem
)EOF";
std::string target;
if (mtls) {
target = yaml_mtls;
} else {
target = yaml_tls;
}
envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext config;
TestUtility::loadFromYaml(TestEnvironment::substitute(target), config);
auto cfg = std::make_unique<Extensions::TransportSockets::Tls::ClientContextConfigImpl>(
config, factory_context_);
static auto* client_stats_store = new Stats::TestIsolatedStoreImpl();
return Network::TransportSocketFactoryPtr{
new Extensions::TransportSockets::Tls::ClientSslSocketFactory(
std::move(cfg), *context_manager_, *client_stats_store)};
}
Network::TransportSocketFactoryPtr XfccIntegrationTest::createUpstreamSslContext() {
envoy::extensions::transport_sockets::tls::v3::DownstreamTlsContext tls_context;
auto* common_tls_context = tls_context.mutable_common_tls_context();
auto* tls_cert = common_tls_context->add_tls_certificates();
tls_cert->mutable_certificate_chain()->set_filename(
TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcert.pem"));
tls_cert->mutable_private_key()->set_filename(
TestEnvironment::runfilesPath("test/config/integration/certs/upstreamkey.pem"));
auto cfg = std::make_unique<Extensions::TransportSockets::Tls::ServerContextConfigImpl>(
tls_context, factory_context_);
static Stats::Scope* upstream_stats_store = new Stats::TestIsolatedStoreImpl();
return std::make_unique<Extensions::TransportSockets::Tls::ServerSslSocketFactory>(
std::move(cfg), *context_manager_, *upstream_stats_store, std::vector<std::string>{});
}
Network::ClientConnectionPtr XfccIntegrationTest::makeTcpClientConnection() {
Network::Address::InstanceConstSharedPtr address =
Network::Utility::resolveUrl("tcp://" + Network::Test::getLoopbackAddressUrlString(version_) +
":" + std::to_string(lookupPort("http")));
return dispatcher_->createClientConnection(address, Network::Address::InstanceConstSharedPtr(),
Network::Test::createRawBufferSocket(), nullptr);
} | 178 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Xfcc::XfccIntegrationTest::initialize | Envoy::Xfcc::XfccIntegrationTest::initialize() | [] | void XfccIntegrationTest::initialize() {
config_helper_.addConfigModifier(
[&](envoy::extensions::filters::network::http_connection_manager::v3::HttpConnectionManager&
hcm) -> void {
hcm.set_forward_client_cert_details(fcc_);
hcm.mutable_set_current_client_cert_details()->CopyFrom(sccd_);
});
config_helper_.addConfigModifier([&](envoy::config::bootstrap::v3::Bootstrap& bootstrap) -> void {
auto transport_socket =
bootstrap.mutable_static_resources()->mutable_clusters(0)->mutable_transport_socket();
envoy::extensions::transport_sockets::tls::v3::UpstreamTlsContext context;
auto* validation_context = context.mutable_common_tls_context()->mutable_validation_context();
validation_context->mutable_trusted_ca()->set_filename(
TestEnvironment::runfilesPath("test/config/integration/certs/upstreamcacert.pem"));
validation_context->add_match_subject_alt_names()->set_suffix("lyft.com");
transport_socket->set_name("envoy.transport_sockets.tls");
transport_socket->mutable_typed_config()->PackFrom(context);
});
if (tls_) {
config_helper_.addSslConfig();
}
context_manager_ =
std::make_unique<Extensions::TransportSockets::Tls::ContextManagerImpl>(timeSystem());
client_tls_ssl_ctx_ = createClientSslContext(false);
client_mtls_ssl_ctx_ = createClientSslContext(true);
HttpIntegrationTest::initialize();
} | 223 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Server::TEST_F | Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryAndSslContext) | ['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryAndSslContext'] | TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryAndSslContext) {
const std::string yaml = TestEnvironment::substitute(R"EOF(
address:
socket_address:
address: 127.0.0.1
protocol: UDP
port_value: 1234
filter_chains:
- filter_chain_match:
transport_protocol: "quic"
filters:
- name: envoy.filters.network.http_connection_manager
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager
codec_type: HTTP3
stat_prefix: hcm
route_config:
name: local_route
http_filters:
- name: envoy.filters.http.router
transport_socket:
name: envoy.transport_sockets.quic
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.quic.v3.QuicDownstreamTransport
downstream_tls_context:
common_tls_context:
tls_certificates:
- certificate_chain:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem"
private_key:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem"
validation_context:
trusted_ca:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem"
match_subject_alt_names:
- exact: localhost
- exact: 127.0.0.1
udp_listener_config:
quic_options: {}
)EOF",
Network::Address::IpVersion::v4);
envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml);
ON_CALL(udp_gso_syscall_, supportsUdpGso())
.WillByDefault(Return(os_sys_calls_actual_.supportsUdpGso()));
EXPECT_CALL(server_.api_.random_, uuid());
expectCreateListenSocket(envoy::config::core::v3::SocketOption::STATE_PREBIND,
#ifdef SO_RXQ_OVFL // SO_REUSEPORT is on as configured
/* expected_num_options */
Api::OsSysCallsSingleton::get().supportsUdpGro() ? 4 : 3,
#else
/* expected_num_options */
Api::OsSysCallsSingleton::get().supportsUdpGro() ? 3 : 2,
#endif
ListenerComponentFactory::BindType::ReusePort);
expectSetsockopt(/* expected_sockopt_level */ IPPROTO_IP,
/* expected_sockopt_name */ ENVOY_IP_PKTINFO,
/* expected_value */ 1,
/* expected_num_calls */ 1);
#ifdef SO_RXQ_OVFL
expectSetsockopt(/* expected_sockopt_level */ SOL_SOCKET,
/* expected_sockopt_name */ SO_RXQ_OVFL,
/* expected_value */ 1,
/* expected_num_calls */ 1);
#endif
expectSetsockopt(/* expected_sockopt_level */ SOL_SOCKET,
/* expected_sockopt_name */ SO_REUSEPORT,
/* expected_value */ 1,
/* expected_num_calls */ 1);
#ifdef UDP_GRO
if (Api::OsSysCallsSingleton::get().supportsUdpGro()) {
expectSetsockopt(/* expected_sockopt_level */ SOL_UDP,
/* expected_sockopt_name */ UDP_GRO,
/* expected_value */ 1,
/* expected_num_calls */ 1);
}
#endif
manager_->addOrUpdateListener(listener_proto, "", true);
EXPECT_EQ(1u, manager_->listeners().size());
EXPECT_FALSE(manager_->listeners()[0]
.get()
.udpListenerConfig()
->listenerFactory()
.isTransportConnectionless());
Network::SocketSharedPtr listen_socket =
manager_->listeners().front().get().listenSocketFactory().getListenSocket(0);
Network::UdpPacketWriterPtr udp_packet_writer =
manager_->listeners()
.front()
.get()
.udpListenerConfig()
->packetWriterFactory()
.createUdpPacketWriter(listen_socket->ioHandle(),
manager_->listeners()[0].get().listenerScope());
EXPECT_EQ(udp_packet_writer->isBatchMode(), Api::OsSysCallsSingleton::get().supportsUdpGso());
// No filter chain found with non-matching transport protocol.
EXPECT_EQ(nullptr, findFilterChain(1234, "127.0.0.1", "", "tls", {}, "8.8.8.8", 111));
auto filter_chain = findFilterChain(1234, "127.0.0.1", "", "quic", {}, "8.8.8.8", 111);
ASSERT_NE(nullptr, filter_chain);
auto& quic_socket_factory = dynamic_cast<const Quic::QuicServerTransportSocketFactory&>(
filter_chain->transportSocketFactory());
EXPECT_TRUE(quic_socket_factory.implementsSecureTransport());
EXPECT_FALSE(quic_socket_factory.getTlsCertificates().empty());
} | 510 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Server::TEST_F | Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryWithConnectionBalencer) | ['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryWithConnectionBalencer'] | TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryWithConnectionBalencer) {
const std::string yaml = TestEnvironment::substitute(R"EOF(
address:
socket_address:
address: 127.0.0.1
protocol: UDP
port_value: 1234
filter_chains:
- filter_chain_match:
transport_protocol: "quic"
filters:
- name: envoy.filters.network.http_connection_manager
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager
codec_type: HTTP3
stat_prefix: hcm
route_config:
name: local_route
http_filters:
- name: envoy.filters.http.router
transport_socket:
name: envoy.transport_sockets.quic
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.quic.v3.QuicDownstreamTransport
downstream_tls_context:
common_tls_context:
tls_certificates:
- certificate_chain:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem"
private_key:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem"
validation_context:
trusted_ca:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem"
match_subject_alt_names:
- exact: localhost
- exact: 127.0.0.1
udp_listener_config:
quic_options: {}
connection_balance_config:
exact_balance: {}
)EOF",
Network::Address::IpVersion::v4);
envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml);
#if defined(ENVOY_ENABLE_QUIC)
EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException,
"connection_balance_config is configured for QUIC listener which doesn't "
"work with connection balancer.");
#else
EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException,
"QUIC is configured but not enabled in the build.");
#endif
} | 151 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Server::TEST_F | Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryWithWrongCodec) | ['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryWithWrongCodec'] | TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryWithWrongCodec) {
const std::string yaml = TestEnvironment::substitute(R"EOF(
address:
socket_address:
address: 127.0.0.1
protocol: UDP
port_value: 1234
filter_chains:
- filter_chain_match:
transport_protocol: "quic"
filters: []
transport_socket:
name: envoy.transport_sockets.quic
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.quic.v3.QuicDownstreamTransport
downstream_tls_context:
common_tls_context:
tls_certificates:
- certificate_chain:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem"
private_key:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem"
validation_context:
trusted_ca:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem"
match_subject_alt_names:
- exact: localhost
- exact: 127.0.0.1
udp_listener_config:
quic_options: {}
)EOF",
Network::Address::IpVersion::v4);
envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml);
#if defined(ENVOY_ENABLE_QUIC)
EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException,
"error building network filter chain for quic listener: requires exactly "
"one http_connection_manager filter.");
#else
EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException,
"QUIC is configured but not enabled in the build.");
#endif
} | 148 | True | 1 |
CVE-2022-21656 | False | False | False | False | AV:N/AC:M/Au:N/C:P/I:P/A:N | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | NONE | 5.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | NETWORK | HIGH | NONE | NONE | UNCHANGED | NONE | HIGH | NONE | 5.9 | MEDIUM | 2.2 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'name': 'https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-295'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.20.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.'}] | 2022-03-02T14:56Z | 2022-02-22T23:15Z | Improper Certificate Validation | The software does not validate, or incorrectly validates, a certificate. | When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
| https://cwe.mitre.org/data/definitions/295.html | 0 | pradeepcrao | 2021-11-24 14:28:02+00:00 | Specify type for matching Subject Alternative Name. (#18628)
Signed-off-by: Pradeep Rao <[email protected]> | bb95af848c939cfe5b5ee33c5b1770558077e64e | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Server::TEST_F | Envoy::Server::TEST_F( ListenerManagerImplQuicOnlyTest , QuicListenerFactoryWithWrongTransportSocket) | ['ListenerManagerImplQuicOnlyTest', 'QuicListenerFactoryWithWrongTransportSocket'] | TEST_F(ListenerManagerImplQuicOnlyTest, QuicListenerFactoryWithWrongTransportSocket) {
const std::string yaml = TestEnvironment::substitute(R"EOF(
address:
socket_address:
address: 127.0.0.1
protocol: UDP
port_value: 1234
filter_chains:
- filter_chain_match:
transport_protocol: "quic"
filters: []
transport_socket:
name: envoy.transport_sockets.quic
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
common_tls_context:
tls_certificates:
- certificate_chain:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_cert.pem"
private_key:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/san_uri_key.pem"
validation_context:
trusted_ca:
filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/ca_cert.pem"
match_subject_alt_names:
- exact: localhost
- exact: 127.0.0.1
udp_listener_config:
quic_options: {}
)EOF",
Network::Address::IpVersion::v4);
envoy::config::listener::v3::Listener listener_proto = parseListenerFromV3Yaml(yaml);
#if defined(ENVOY_ENABLE_QUIC)
EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException,
"wrong transport socket config specified for quic transport socket");
#else
EXPECT_THROW_WITH_REGEX(manager_->addOrUpdateListener(listener_proto, "", true), EnvoyException,
"QUIC is configured but not enabled in the build.");
#endif
} | 147 | True | 1 |
CVE-2022-23606 | False | False | False | False | AV:N/AC:L/Au:S/C:N/I:N/A:P | NETWORK | LOW | SINGLE | NONE | NONE | PARTIAL | 4.0 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 6.5 | MEDIUM | 2.8 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-674'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}] | 2022-03-02T14:37Z | 2022-02-22T23:15Z | Uncontrolled Recursion | The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack. | https://cwe.mitre.org/data/definitions/674.html | 0 | Yan Avlasov | 2022-02-01 19:33:02+00:00 | CVE-2022-23606
Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed.
Signed-off-by: Yan Avlasov <[email protected]> | 4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::ConnectionPool::ConnPoolImplBase::checkForIdleAndCloseIdleConnsIfDraining | Envoy::ConnectionPool::ConnPoolImplBase::checkForIdleAndCloseIdleConnsIfDraining() | [] | void ConnPoolImplBase::checkForIdleAndCloseIdleConnsIfDraining() {
if (is_draining_for_deletion_) {
closeIdleConnectionsForDrainingPool();
}
if (isIdleImpl()) {
ENVOY_LOG(debug, "invoking idle callbacks - is_draining_for_deletion_={}",
is_draining_for_deletion_);
for (const Instance::IdleCb& cb : idle_callbacks_) {
cb();
}
}
} | 51 | True | 1 |
|
CVE-2022-23606 | False | False | False | False | AV:N/AC:L/Au:S/C:N/I:N/A:P | NETWORK | LOW | SINGLE | NONE | NONE | PARTIAL | 4.0 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 6.5 | MEDIUM | 2.8 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-674'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}] | 2022-03-02T14:37Z | 2022-02-22T23:15Z | Uncontrolled Recursion | The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack. | https://cwe.mitre.org/data/definitions/674.html | 0 | Yan Avlasov | 2022-02-01 19:33:02+00:00 | CVE-2022-23606
Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed.
Signed-off-by: Yan Avlasov <[email protected]> | 4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::ConnectionPool::ConnPoolImplBase::onConnectionEvent | Envoy::ConnectionPool::ConnPoolImplBase::onConnectionEvent( ActiveClient & client , absl :: string_view failure_reason , Network :: ConnectionEvent event) | ['client', 'failure_reason', 'event'] | void ConnPoolImplBase::onConnectionEvent(ActiveClient& client, absl::string_view failure_reason,
Network::ConnectionEvent event) {
if (client.state() == ActiveClient::State::CONNECTING) {
ASSERT(connecting_stream_capacity_ >= client.effectiveConcurrentStreamLimit());
connecting_stream_capacity_ -= client.effectiveConcurrentStreamLimit();
}
if (client.connect_timer_) {
client.connect_timer_->disableTimer();
client.connect_timer_.reset();
}
if (event == Network::ConnectionEvent::RemoteClose ||
event == Network::ConnectionEvent::LocalClose) {
state_.decrConnectingAndConnectedStreamCapacity(client.currentUnusedCapacity());
// Make sure that onStreamClosed won't double count.
client.remaining_streams_ = 0;
// The client died.
ENVOY_CONN_LOG(debug, "client disconnected, failure reason: {}", client, failure_reason);
Envoy::Upstream::reportUpstreamCxDestroy(host_, event);
const bool incomplete_stream = client.closingWithIncompleteStream();
if (incomplete_stream) {
Envoy::Upstream::reportUpstreamCxDestroyActiveRequest(host_, event);
}
if (client.state() == ActiveClient::State::CONNECTING) {
host_->cluster().stats().upstream_cx_connect_fail_.inc();
host_->stats().cx_connect_fail_.inc();
ConnectionPool::PoolFailureReason reason;
if (client.timed_out_) {
reason = ConnectionPool::PoolFailureReason::Timeout;
} else if (event == Network::ConnectionEvent::RemoteClose) {
reason = ConnectionPool::PoolFailureReason::RemoteConnectionFailure;
} else {
reason = ConnectionPool::PoolFailureReason::LocalConnectionFailure;
}
// Raw connect failures should never happen under normal circumstances. If we have an upstream
// that is behaving badly, streams can get stuck here in the pending state. If we see a
// connect failure, we purge all pending streams so that calling code can determine what to
// do with the stream.
// NOTE: We move the existing pending streams to a temporary list. This is done so that
// if retry logic submits a new stream to the pool, we don't fail it inline.
purgePendingStreams(client.real_host_description_, failure_reason, reason);
// See if we should preconnect based on active connections.
if (!is_draining_for_deletion_) {
tryCreateNewConnections();
}
}
// We need to release our resourceManager() resources before checking below for
// whether we can create a new connection. Normally this would happen when
// client's destructor runs, but this object needs to be deferredDelete'd(), so
// this forces part of its cleanup to happen now.
client.releaseResources();
// Again, since we know this object is going to be deferredDelete'd(), we take
// this opportunity to disable and reset the connection duration timer so that
// it doesn't trigger while on the deferred delete list. In theory it is safe
// to handle the CLOSED state in onConnectionDurationTimeout, but we handle
// it here for simplicity and safety anyway.
if (client.connection_duration_timer_) {
client.connection_duration_timer_->disableTimer();
client.connection_duration_timer_.reset();
}
dispatcher_.deferredDelete(client.removeFromList(owningList(client.state())));
checkForIdleAndCloseIdleConnsIfDraining();
client.setState(ActiveClient::State::CLOSED);
// If we have pending streams and we just lost a connection we should make a new one.
if (!pending_streams_.empty()) {
tryCreateNewConnections();
}
} else if (event == Network::ConnectionEvent::Connected) {
client.conn_connect_ms_->complete();
client.conn_connect_ms_.reset();
ASSERT(client.state() == ActiveClient::State::CONNECTING);
bool streams_available = client.currentUnusedCapacity() > 0;
transitionActiveClientState(client, streams_available ? ActiveClient::State::READY
: ActiveClient::State::BUSY);
// Now that the active client is ready, set up a timer for max connection duration.
const absl::optional<std::chrono::milliseconds> max_connection_duration =
client.parent_.host()->cluster().maxConnectionDuration();
if (max_connection_duration.has_value()) {
client.connection_duration_timer_ = client.parent_.dispatcher().createTimer(
[&client]() { client.onConnectionDurationTimeout(); });
client.connection_duration_timer_->enableTimer(max_connection_duration.value());
}
// At this point, for the mixed ALPN pool, the client may be deleted. Do not
// refer to client after this point.
onConnected(client);
if (streams_available) {
onUpstreamReady();
}
checkForIdleAndCloseIdleConnsIfDraining();
}
} | 538 | True | 1 |
|
CVE-2022-23606 | False | False | False | False | AV:N/AC:L/Au:S/C:N/I:N/A:P | NETWORK | LOW | SINGLE | NONE | NONE | PARTIAL | 4.0 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 6.5 | MEDIUM | 2.8 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-674'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}] | 2022-03-02T14:37Z | 2022-02-22T23:15Z | Uncontrolled Recursion | The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack. | https://cwe.mitre.org/data/definitions/674.html | 0 | Yan Avlasov | 2022-02-01 19:33:02+00:00 | CVE-2022-23606
Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed.
Signed-off-by: Yan Avlasov <[email protected]> | 4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::CdsIntegrationTest::CdsIntegrationTest | Envoy::CdsIntegrationTest::CdsIntegrationTest() | [] | CdsIntegrationTest()
: HttpIntegrationTest(Http::CodecType::HTTP2, ipVersion(),
ConfigHelper::discoveredClustersBootstrap(
sotwOrDelta() == Grpc::SotwOrDelta::Sotw ||
sotwOrDelta() == Grpc::SotwOrDelta::UnifiedSotw
? "GRPC"
: "DELTA_GRPC")) {
if (sotwOrDelta() == Grpc::SotwOrDelta::UnifiedSotw ||
sotwOrDelta() == Grpc::SotwOrDelta::UnifiedDelta) {
config_helper_.addRuntimeOverride("envoy.reloadable_features.unified_mux", "true");
}
use_lds_ = false;
sotw_or_delta_ = sotwOrDelta();
} | 90 | True | 1 |
|
CVE-2022-23606 | False | False | False | False | AV:N/AC:L/Au:S/C:N/I:N/A:P | NETWORK | LOW | SINGLE | NONE | NONE | PARTIAL | 4.0 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 6.5 | MEDIUM | 2.8 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'name': 'https://github.com/envoyproxy/envoy/commit/4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-674'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:1.21.0:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.'}] | 2022-03-02T14:37Z | 2022-02-22T23:15Z | Uncontrolled Recursion | The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack. | https://cwe.mitre.org/data/definitions/674.html | 0 | Yan Avlasov | 2022-02-01 19:33:02+00:00 | CVE-2022-23606
Avoid closing other connections to prevent deep recursion when a large number of idle connections are closed at the start of a pool drain, when a connection is closed.
Signed-off-by: Yan Avlasov <[email protected]> | 4b6dd3b53cd5c6d4d4df378a2fc62c1707522b31 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::CdsIntegrationTest::initialize | Envoy::CdsIntegrationTest::initialize() | [] | void initialize() override {
use_lds_ = false;
test_skipped_ = false;
// Controls how many addFakeUpstream() will happen in
// BaseIntegrationTest::createUpstreams() (which is part of initialize()).
// Make sure this number matches the size of the 'clusters' repeated field in the bootstrap
// config that you use!
setUpstreamCount(1); // the CDS cluster
setUpstreamProtocol(Http::CodecType::HTTP2); // CDS uses gRPC uses HTTP2.
// HttpIntegrationTest::initialize() does many things:
// 1) It appends to fake_upstreams_ as many as you asked for via setUpstreamCount().
// 2) It updates your bootstrap config with the ports your fake upstreams are actually listening
// on (since you're supposed to leave them as 0).
// 3) It creates and starts an IntegrationTestServer - the thing that wraps the almost-actual
// Envoy used in the tests.
// 4) Bringing up the server usually entails waiting to ensure that any listeners specified in
// the bootstrap config have come up, and registering them in a port map (see lookupPort()).
// However, this test needs to defer all of that to later.
defer_listener_finalization_ = true;
HttpIntegrationTest::initialize();
// Create the regular (i.e. not an xDS server) upstreams. We create them manually here after
// initialize() because finalize() expects all fake_upstreams_ to correspond to a static
// cluster in the bootstrap config - which we don't want since we're testing dynamic CDS!
addFakeUpstream(Http::CodecType::HTTP2);
addFakeUpstream(Http::CodecType::HTTP2);
cluster1_ = ConfigHelper::buildStaticCluster(
ClusterName1, fake_upstreams_[UpstreamIndex1]->localAddress()->ip()->port(),
Network::Test::getLoopbackAddressString(ipVersion()));
cluster2_ = ConfigHelper::buildStaticCluster(
ClusterName2, fake_upstreams_[UpstreamIndex2]->localAddress()->ip()->port(),
Network::Test::getLoopbackAddressString(ipVersion()));
// Let Envoy establish its connection to the CDS server.
acceptXdsConnection();
// Do the initial compareDiscoveryRequest / sendDiscoveryResponse for cluster_1.
EXPECT_TRUE(compareDiscoveryRequest(Config::TypeUrl::get().Cluster, "", {}, {}, {}, true));
sendDiscoveryResponse<envoy::config::cluster::v3::Cluster>(Config::TypeUrl::get().Cluster,
{cluster1_}, {cluster1_}, {}, "55");
// We can continue the test once we're sure that Envoy's ClusterManager has made use of
// the DiscoveryResponse describing cluster_1 that we sent.
// 2 because the statically specified CDS server itself counts as a cluster.
test_server_->waitForGaugeGe("cluster_manager.active_clusters", 2);
// Wait for our statically specified listener to become ready, and register its port in the
// test framework's downstream listener port map.
test_server_->waitUntilListenersReady();
registerTestServerPorts({"http"});
} | 222 | True | 1 |
|
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::ConnectionManagerImpl::ActiveStream::encodeHeaders | Envoy::Http::ConnectionManagerImpl::ActiveStream::encodeHeaders( ResponseHeaderMap & headers , bool end_stream) | ['headers', 'end_stream'] | void ConnectionManagerImpl::ActiveStream::encodeHeaders(ResponseHeaderMap& headers,
bool end_stream) {
// Base headers.
// We want to preserve the original date header, but we add a date header if it is absent
if (!headers.Date()) {
connection_manager_.config_.dateProvider().setDateHeader(headers);
}
// Following setReference() is safe because serverName() is constant for the life of the
// listener.
const auto transformation = connection_manager_.config_.serverHeaderTransformation();
if (transformation == ConnectionManagerConfig::HttpConnectionManagerProto::OVERWRITE ||
(transformation == ConnectionManagerConfig::HttpConnectionManagerProto::APPEND_IF_ABSENT &&
headers.Server() == nullptr)) {
headers.setReferenceServer(connection_manager_.config_.serverName());
}
ConnectionManagerUtility::mutateResponseHeaders(
headers, request_headers_.get(), connection_manager_.config_,
connection_manager_.config_.via(), filter_manager_.streamInfo(),
connection_manager_.proxy_name_, connection_manager_.clear_hop_by_hop_response_headers_);
bool drain_connection_due_to_overload = false;
if (connection_manager_.drain_state_ == DrainState::NotDraining &&
connection_manager_.random_generator_.bernoulli(
connection_manager_.overload_disable_keepalive_ref_.value())) {
ENVOY_STREAM_LOG(debug, "disabling keepalive due to envoy overload", *this);
drain_connection_due_to_overload = true;
connection_manager_.stats_.named_.downstream_cx_overload_disable_keepalive_.inc();
}
// See if we want to drain/close the connection. Send the go away frame prior to encoding the
// header block.
if (connection_manager_.drain_state_ == DrainState::NotDraining &&
(connection_manager_.drain_close_.drainClose() || drain_connection_due_to_overload)) {
// This doesn't really do anything for HTTP/1.1 other then give the connection another boost
// of time to race with incoming requests. For HTTP/2 connections, send a GOAWAY frame to
// prevent any new streams.
connection_manager_.startDrainSequence();
connection_manager_.stats_.named_.downstream_cx_drain_close_.inc();
ENVOY_STREAM_LOG(debug, "drain closing connection", *this);
}
if (connection_manager_.codec_->protocol() == Protocol::Http10) {
// As HTTP/1.0 and below can not do chunked encoding, if there is no content
// length the response will be framed by connection close.
if (!headers.ContentLength()) {
state_.saw_connection_close_ = true;
}
// If the request came with a keep-alive and no other factor resulted in a
// connection close header, send an explicit keep-alive header.
if (!state_.saw_connection_close_) {
headers.setConnection(Headers::get().ConnectionValues.KeepAlive);
}
}
if (connection_manager_.drain_state_ == DrainState::NotDraining && state_.saw_connection_close_) {
ENVOY_STREAM_LOG(debug, "closing connection due to connection close header", *this);
connection_manager_.drain_state_ = DrainState::Closing;
}
// If we are destroying a stream before remote is complete and the connection does not support
// multiplexing, we should disconnect since we don't want to wait around for the request to
// finish.
if (!filter_manager_.remoteComplete()) {
if (connection_manager_.codec_->protocol() < Protocol::Http2) {
connection_manager_.drain_state_ = DrainState::Closing;
}
connection_manager_.stats_.named_.downstream_rq_response_before_rq_complete_.inc();
}
if (connection_manager_.drain_state_ != DrainState::NotDraining &&
connection_manager_.codec_->protocol() < Protocol::Http2) {
// If the connection manager is draining send "Connection: Close" on HTTP/1.1 connections.
// Do not do this for H2 (which drains via GOAWAY) or Upgrade or CONNECT (as the
// payload is no longer HTTP/1.1)
if (!Utility::isUpgrade(headers) &&
!HeaderUtility::isConnectResponse(request_headers_.get(), *responseHeaders())) {
headers.setReferenceConnection(Headers::get().ConnectionValues.Close);
}
}
if (connection_manager_.config_.tracingConfig()) {
if (connection_manager_.config_.tracingConfig()->operation_name_ ==
Tracing::OperationName::Ingress) {
// For ingress (inbound) responses, if the request headers do not include a
// decorator operation (override), and the decorated operation should be
// propagated, then pass the decorator's operation name (if defined)
// as a response header to enable the client service to use it in its client span.
if (decorated_operation_ && state_.decorated_propagate_) {
headers.setEnvoyDecoratorOperation(*decorated_operation_);
}
} else if (connection_manager_.config_.tracingConfig()->operation_name_ ==
Tracing::OperationName::Egress) {
const HeaderEntry* resp_operation_override = headers.EnvoyDecoratorOperation();
// For Egress (outbound) response, if a decorator operation name has been provided, it
// should be used to override the active span's operation.
if (resp_operation_override) {
if (!resp_operation_override->value().empty() && active_span_) {
active_span_->setOperation(resp_operation_override->value().getStringView());
}
// Remove header so not propagated to service.
headers.removeEnvoyDecoratorOperation();
}
}
}
chargeStats(headers);
ENVOY_STREAM_LOG(debug, "encoding headers via codec (end_stream={}):\n{}", *this, end_stream,
headers);
// Now actually encode via the codec.
filter_manager_.streamInfo().downstreamTiming().onFirstDownstreamTxByteSent(
connection_manager_.time_source_);
response_encoder_->encodeHeaders(headers, end_stream);
} | 620 | True | 1 |
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::ConnectionManagerImpl::doEndStream | Envoy::Http::ConnectionManagerImpl::doEndStream( ActiveStream & stream) | ['stream'] | void ConnectionManagerImpl::doEndStream(ActiveStream& stream) {
// The order of what happens in this routine is important and a little complicated. We first see
// if the stream needs to be reset. If it needs to be, this will end up invoking reset callbacks
// and then moving the stream to the deferred destruction list. If the stream has not been reset,
// we move it to the deferred deletion list here. Then, we potentially close the connection. This
// must be done after deleting the stream since the stream refers to the connection and must be
// deleted first.
bool reset_stream = false;
// If the response encoder is still associated with the stream, reset the stream. The exception
// here is when Envoy "ends" the stream by calling recreateStream at which point recreateStream
// explicitly nulls out response_encoder to avoid the downstream being notified of the
// Envoy-internal stream instance being ended.
if (stream.response_encoder_ != nullptr &&
(!stream.filter_manager_.remoteComplete() || !stream.state_.codec_saw_local_complete_)) {
// Indicate local is complete at this point so that if we reset during a continuation, we don't
// raise further data or trailers.
ENVOY_STREAM_LOG(debug, "doEndStream() resetting stream", stream);
// TODO(snowp): This call might not be necessary, try to clean up + remove setter function.
stream.filter_manager_.setLocalComplete();
stream.state_.codec_saw_local_complete_ = true;
// Per https://tools.ietf.org/html/rfc7540#section-8.3 if there was an error
// with the TCP connection during a CONNECT request, it should be
// communicated via CONNECT_ERROR
if (requestWasConnect(stream.request_headers_, codec_->protocol()) &&
(stream.filter_manager_.streamInfo().hasResponseFlag(
StreamInfo::ResponseFlag::UpstreamConnectionFailure) ||
stream.filter_manager_.streamInfo().hasResponseFlag(
StreamInfo::ResponseFlag::UpstreamConnectionTermination))) {
stream.response_encoder_->getStream().resetStream(StreamResetReason::ConnectError);
} else {
if (stream.filter_manager_.streamInfo().hasResponseFlag(
StreamInfo::ResponseFlag::UpstreamProtocolError)) {
stream.response_encoder_->getStream().resetStream(StreamResetReason::ProtocolError);
} else {
stream.response_encoder_->getStream().resetStream(StreamResetReason::LocalReset);
}
}
reset_stream = true;
}
if (!reset_stream) {
doDeferredStreamDestroy(stream);
}
if (reset_stream && codec_->protocol() < Protocol::Http2) {
drain_state_ = DrainState::Closing;
}
// If HTTP/1.0 has no content length, it is framed by close and won't consider
// the request complete until the FIN is read. Don't delay close in this case.
bool http_10_sans_cl = (codec_->protocol() == Protocol::Http10) &&
(!stream.response_headers_ || !stream.response_headers_->ContentLength());
// We also don't delay-close in the case of HTTP/1.1 where the request is
// fully read, as there's no race condition to avoid.
bool connection_close = stream.state_.saw_connection_close_;
bool request_complete = stream.filter_manager_.remoteComplete();
checkForDeferredClose(connection_close && (request_complete || http_10_sans_cl));
} | 293 | True | 1 |
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::ActiveStreamDecoderFilter::complete | Envoy::Http::ActiveStreamDecoderFilter::complete() | [] | bool ActiveStreamDecoderFilter::complete() { return parent_.state_.remote_complete_; } | 14 | True | 1 |
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::FilterManager::maybeEndDecode | Envoy::Http::FilterManager::maybeEndDecode( bool end_stream) | ['end_stream'] | void FilterManager::maybeEndDecode(bool end_stream) {
ASSERT(!state_.remote_complete_);
state_.remote_complete_ = end_stream;
if (end_stream) {
stream_info_.downstreamTiming().onLastDownstreamRxByteReceived(dispatcher().timeSource());
ENVOY_STREAM_LOG(debug, "request end stream", *this);
}
} | 56 | True | 1 |
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::ActiveStreamEncoderFilter::canContinue | Envoy::Http::ActiveStreamEncoderFilter::canContinue() | [] | bool canContinue() override { return true; } | 9 | True | 1 |
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::FilterManager::State::State | Envoy::Http::FilterManager::State::State() | [] | State()
: remote_complete_(false), local_complete_(false), has_1xx_headers_(false),
created_filter_chain_(false), is_head_request_(false), is_grpc_request_(false),
non_100_response_headers_encoded_(false), under_on_local_reply_(false),
decoder_filter_chain_aborted_(false), encoder_filter_chain_aborted_(false),
saw_downstream_reset_(false) {} | 60 | True | 1 |
CVE-2021-43825 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'name': 'https://github.com/envoyproxy/envoy/commit/148de954ed3585d8b4298b424aa24916d0de6136', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data is over the limit by sending 413 or 500 responses. However when the buffer overflows while response is processed by the filter chain the operation may not be aborted correctly and result in accessing a freed memory block. If this happens Envoy will crash resulting in a denial of service.'}] | 2022-03-02T18:13Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:50:04+00:00 | CVE-2021-43825
Response filter manager crash
Signed-off-by: Yan Avlasov <[email protected]> | 148de954ed3585d8b4298b424aa24916d0de6136 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Http::FilterManager::remoteComplete | Envoy::Http::FilterManager::remoteComplete() const | [] | bool remoteComplete() const { return state_.remote_complete_; } | 11 | True | 1 |
CVE-2021-43826 | False | False | False | False | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/ce0ae309057a216aba031aff81c445c90c6ef145', 'name': 'https://github.com/envoyproxy/envoy/commit/ce0ae309057a216aba031aff81c445c90c6ef145', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:`upstream tunneling <envoy_v3_api_field_extensions.filters.network.tcp_proxy.v3.TcpProxy.tunneling_config>` and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. There are no workarounds for this issue. Users are advised to upgrade.'}] | 2022-03-02T15:23Z | 2022-02-22T23:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Yan Avlasov | 2022-02-01 19:53:42+00:00 | CVE-2021-43826
Signed-off-by: Yan Avlasov <[email protected]> | ce0ae309057a216aba031aff81c445c90c6ef145 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::TcpProxy::Filter::onUpstreamEvent | Envoy::TcpProxy::Filter::onUpstreamEvent( Network :: ConnectionEvent event) | ['event'] | void Filter::onUpstreamEvent(Network::ConnectionEvent event) {
// Update the connecting flag before processing the event because we may start a new connection
// attempt in initializeUpstreamConnection.
bool connecting = connecting_;
connecting_ = false;
if (event == Network::ConnectionEvent::RemoteClose ||
event == Network::ConnectionEvent::LocalClose) {
upstream_.reset();
disableIdleTimer();
if (connecting) {
if (event == Network::ConnectionEvent::RemoteClose) {
getStreamInfo().setResponseFlag(StreamInfo::ResponseFlag::UpstreamConnectionFailure);
read_callbacks_->upstreamHost()->outlierDetector().putResult(
Upstream::Outlier::Result::LocalOriginConnectFailed);
}
initializeUpstreamConnection();
} else {
if (read_callbacks_->connection().state() == Network::Connection::State::Open) {
read_callbacks_->connection().close(Network::ConnectionCloseType::FlushWrite);
}
}
}
} | 146 | True | 1 |
CVE-2022-21655 | False | False | False | False | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'name': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-670'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}] | 2022-03-02T14:27Z | 2022-02-22T23:15Z | Always-Incorrect Control Flow Implementation | The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated. | This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.
| https://cwe.mitre.org/data/definitions/670.html | 0 | Yan Avlasov | 2022-02-01 19:59:31+00:00 | CVE-2022-21655
Crash with direct_response
Signed-off-by: Yan Avlasov <[email protected]> | 177d608155ba8b11598b9bbf8240e90d8c350682 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Router::Filter::convertRequestHeadersForInternalRedirect | Envoy::Router::Filter::convertRequestHeadersForInternalRedirect( Http :: RequestHeaderMap & downstream_headers , const Http :: HeaderEntry & internal_redirect , uint64_t status_code) | ['downstream_headers', 'internal_redirect', 'status_code'] | bool Filter::convertRequestHeadersForInternalRedirect(Http::RequestHeaderMap& downstream_headers,
const Http::HeaderEntry& internal_redirect,
uint64_t status_code) {
if (!downstream_headers.Path()) {
ENVOY_STREAM_LOG(trace, "Internal redirect failed: no path in downstream_headers", *callbacks_);
return false;
}
absl::string_view redirect_url = internal_redirect.value().getStringView();
// Make sure the redirect response contains a URL to redirect to.
if (redirect_url.empty()) {
config_.stats_.passthrough_internal_redirect_bad_location_.inc();
ENVOY_STREAM_LOG(trace, "Internal redirect failed: empty location", *callbacks_);
return false;
}
Http::Utility::Url absolute_url;
if (!absolute_url.initialize(redirect_url, false)) {
config_.stats_.passthrough_internal_redirect_bad_location_.inc();
ENVOY_STREAM_LOG(trace, "Internal redirect failed: invalid location {}", *callbacks_,
redirect_url);
return false;
}
const auto& policy = route_entry_->internalRedirectPolicy();
// Don't change the scheme from the original request
const bool scheme_is_http = schemeIsHttp(downstream_headers, *callbacks_->connection());
const bool target_is_http = absolute_url.scheme() == Http::Headers::get().SchemeValues.Http;
if (!policy.isCrossSchemeRedirectAllowed() && scheme_is_http != target_is_http) {
ENVOY_STREAM_LOG(trace, "Internal redirect failed: incorrect scheme for {}", *callbacks_,
redirect_url);
config_.stats_.passthrough_internal_redirect_unsafe_scheme_.inc();
return false;
}
const StreamInfo::FilterStateSharedPtr& filter_state = callbacks_->streamInfo().filterState();
// Make sure that performing the redirect won't result in exceeding the configured number of
// redirects allowed for this route.
StreamInfo::UInt32Accessor* num_internal_redirect{};
if (num_internal_redirect = filter_state->getDataMutable<StreamInfo::UInt32Accessor>(
NumInternalRedirectsFilterStateName);
num_internal_redirect == nullptr) {
auto state = std::make_shared<StreamInfo::UInt32AccessorImpl>(0);
num_internal_redirect = state.get();
filter_state->setData(NumInternalRedirectsFilterStateName, std::move(state),
StreamInfo::FilterState::StateType::Mutable,
StreamInfo::FilterState::LifeSpan::Request);
}
if (num_internal_redirect->value() >= policy.maxInternalRedirects()) {
ENVOY_STREAM_LOG(trace, "Internal redirect failed: redirect limits exceeded.", *callbacks_);
config_.stats_.passthrough_internal_redirect_too_many_redirects_.inc();
return false;
}
// Copy the old values, so they can be restored if the redirect fails.
const std::string original_host(downstream_headers.getHostValue());
const std::string original_path(downstream_headers.getPathValue());
const bool scheme_is_set = (downstream_headers.Scheme() != nullptr);
Cleanup restore_original_headers(
[&downstream_headers, original_host, original_path, scheme_is_set, scheme_is_http]() {
downstream_headers.setHost(original_host);
downstream_headers.setPath(original_path);
if (scheme_is_set) {
downstream_headers.setScheme(scheme_is_http ? Http::Headers::get().SchemeValues.Http
: Http::Headers::get().SchemeValues.Https);
}
});
// Replace the original host, scheme and path.
downstream_headers.setScheme(absolute_url.scheme());
downstream_headers.setHost(absolute_url.hostAndPort());
auto path_and_query = absolute_url.pathAndQueryParams();
if (Runtime::runtimeFeatureEnabled("envoy.reloadable_features.http_reject_path_with_fragment")) {
// Envoy treats internal redirect as a new request and will reject it if URI path
// contains #fragment. However the Location header is allowed to have #fragment in URI path. To
// prevent Envoy from rejecting internal redirect, strip the #fragment from Location URI if it
// is present.
auto fragment_pos = path_and_query.find('#');
path_and_query = path_and_query.substr(0, fragment_pos);
}
downstream_headers.setPath(path_and_query);
callbacks_->clearRouteCache();
const auto route = callbacks_->route();
// Don't allow a redirect to a non existing route.
if (!route) {
config_.stats_.passthrough_internal_redirect_no_route_.inc();
ENVOY_STREAM_LOG(trace, "Internal redirect failed: no route found", *callbacks_);
return false;
}
const auto& route_name = route->routeEntry()->routeName();
for (const auto& predicate : policy.predicates()) {
if (!predicate->acceptTargetRoute(*filter_state, route_name, !scheme_is_http,
!target_is_http)) {
config_.stats_.passthrough_internal_redirect_predicate_.inc();
ENVOY_STREAM_LOG(trace,
"Internal redirect failed: rejecting redirect targeting {}, by {} predicate",
*callbacks_, route_name, predicate->name());
return false;
}
}
// See https://tools.ietf.org/html/rfc7231#section-6.4.4.
if (status_code == enumToInt(Http::Code::SeeOther) &&
downstream_headers.getMethodValue() != Http::Headers::get().MethodValues.Get &&
downstream_headers.getMethodValue() != Http::Headers::get().MethodValues.Head) {
downstream_headers.setMethod(Http::Headers::get().MethodValues.Get);
downstream_headers.remove(Http::Headers::get().ContentLength);
callbacks_->modifyDecodingBuffer([](Buffer::Instance& data) { data.drain(data.length()); });
}
num_internal_redirect->increment();
restore_original_headers.cancel();
// Preserve the original request URL for the second pass.
downstream_headers.setEnvoyOriginalUrl(absl::StrCat(scheme_is_http
? Http::Headers::get().SchemeValues.Http
: Http::Headers::get().SchemeValues.Https,
"://", original_host, original_path));
return true;
} | 846 | True | 1 |
CVE-2022-21655 | False | False | False | False | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'name': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-670'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}] | 2022-03-02T14:27Z | 2022-02-22T23:15Z | Always-Incorrect Control Flow Implementation | The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated. | This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.
| https://cwe.mitre.org/data/definitions/670.html | 0 | Yan Avlasov | 2022-02-01 19:59:31+00:00 | CVE-2022-21655
Crash with direct_response
Signed-off-by: Yan Avlasov <[email protected]> | 177d608155ba8b11598b9bbf8240e90d8c350682 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Router::TEST_F | Envoy::Router::TEST_F( RouterTest , MissingRequiredHeaders) | ['RouterTest', 'MissingRequiredHeaders'] | TEST_F(RouterTest, MissingRequiredHeaders) {
NiceMock<Http::MockRequestEncoder> encoder;
Http::ResponseDecoder* response_decoder = nullptr;
expectNewStreamWithImmediateEncoder(encoder, &response_decoder, Http::Protocol::Http10);
expectResponseTimerCreate();
Http::TestRequestHeaderMapImpl headers;
HttpTestUtility::addDefaultHeaders(headers);
headers.removeMethod();
EXPECT_CALL(encoder, encodeHeaders(_, _))
.WillOnce(Invoke([](const Http::RequestHeaderMap& headers, bool) -> Http::Status {
return Http::HeaderUtility::checkRequiredRequestHeaders(headers);
}));
EXPECT_CALL(
callbacks_,
sendLocalReply(Http::Code::ServiceUnavailable,
testing::Eq("missing required header: :method"), _, _,
"filter_removed_required_request_headers{missing_required_header:_:method}"))
.WillOnce(testing::InvokeWithoutArgs([] {}));
router_.decodeHeaders(headers, true);
router_.onDestroy();
} | 162 | True | 1 |
CVE-2022-21655 | False | False | False | False | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'name': 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'name': 'https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350682', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-670'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.21.0', 'versionEndExcluding': '1.21.1', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.20.0', 'versionEndExcluding': '1.20.2', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionStartIncluding': '1.19.0', 'versionEndExcluding': '1.19.3', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.18.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}] | 2022-03-02T14:27Z | 2022-02-22T23:15Z | Always-Incorrect Control Flow Implementation | The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated. | This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.
| https://cwe.mitre.org/data/definitions/670.html | 0 | Yan Avlasov | 2022-02-01 19:59:31+00:00 | CVE-2022-21655
Crash with direct_response
Signed-off-by: Yan Avlasov <[email protected]> | 177d608155ba8b11598b9bbf8240e90d8c350682 | False | envoyproxy/envoy | Cloud-native high-performance edge/middle/service proxy | 2016-08-08 15:07:24 | 2022-08-27 20:59:09 | https://www.envoyproxy.io | envoyproxy | 20284.0 | 3840.0 | Envoy::Router::TEST_F | Envoy::Router::TEST_F( RouterTest , RetryUpstreamResetResponseStarted) | ['RouterTest', 'RetryUpstreamResetResponseStarted'] | TEST_F(RouterTest, RetryUpstreamResetResponseStarted) {
NiceMock<Http::MockRequestEncoder> encoder1;
Http::ResponseDecoder* response_decoder = nullptr;
expectNewStreamWithImmediateEncoder(encoder1, &response_decoder, Http::Protocol::Http10);
expectResponseTimerCreate();
Http::TestRequestHeaderMapImpl headers{{"x-envoy-retry-on", "5xx"}, {"x-envoy-internal", "true"}};
HttpTestUtility::addDefaultHeaders(headers);
router_.decodeHeaders(headers, true);
EXPECT_EQ(1U,
callbacks_.route_->route_entry_.virtual_cluster_.stats().upstream_rq_total_.value());
// Since the response is already started we don't retry.
EXPECT_CALL(*router_.retry_state_, shouldRetryHeaders(_, _, _)).WillOnce(Return(RetryStatus::No));
EXPECT_CALL(callbacks_, encodeHeaders_(_, false));
Http::ResponseHeaderMapPtr response_headers(
new Http::TestResponseHeaderMapImpl{{":status", "200"}});
EXPECT_CALL(cm_.thread_local_cluster_.conn_pool_.host_->outlier_detector_,
putHttpResponseCode(200));
response_decoder->decodeHeaders(std::move(response_headers), false);
EXPECT_CALL(cm_.thread_local_cluster_.conn_pool_.host_->outlier_detector_,
putResult(Upstream::Outlier::Result::LocalOriginConnectFailed, _));
// Normally, sendLocalReply will actually send the reply, but in this case the
// HCM will detect the headers have already been sent and not route through
// the encoder again.
EXPECT_CALL(callbacks_, sendLocalReply(_, _, _, _, _)).WillOnce(testing::InvokeWithoutArgs([] {
}));
encoder1.stream_.resetStream(Http::StreamResetReason::RemoteReset);
// For normal HTTP, once we have a 200 we consider this a success, even if a
// later reset occurs.
EXPECT_TRUE(verifyHostUpstreamStats(1, 0));
EXPECT_EQ(1U,
callbacks_.route_->route_entry_.virtual_cluster_.stats().upstream_rq_total_.value());
} | 291 | True | 1 |
CVE-2019-15296 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174', 'name': 'https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html', 'name': '[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update', 'refsource': 'MLIST', 'tags': ['Third Party Advisory']}, {'url': 'https://www.debian.org/security/2019/dsa-4522', 'name': 'DSA-4522', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'https://seclists.org/bugtraq/2019/Sep/28', 'name': '20190916 [SECURITY] [DSA 4522-1] faad2 security update', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/202006-17', 'name': 'GLSA-202006-17', 'refsource': 'GENTOO', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow is later performed via getdword_n(&ld->start[words], ld->bytes_left).'}] | 2020-06-15T18:15Z | 2019-08-21T07:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Fabian Greffrath | 2019-06-10 13:58:40+02:00 | Fix a couple buffer overflows
https://hackerone.com/reports/502816
https://hackerone.com/reports/507858
https://github.com/videolan/vlc/blob/master/contrib/src/faad2/faad2-fix-overflows.patch | 942c3e0aee748ea6fe97cb2c1aa5893225316174 | False | knik0/faad2 | Freeware Advanced Audio (AAC) Decoder faad2 mirror | 2017-07-25 07:35:55 | 2022-08-24 06:26:39 | https://sourceforge.net/projects/faac/ | knik0 | 110.0 | 46.0 | faad_resetbits | faad_resetbits( bitfile * ld , int bits) | ['ld', 'bits'] | void faad_resetbits(bitfile *ld, int bits)
{
uint32_t tmp;
int words = bits >> 5;
int remainder = bits & 0x1F;
ld->bytes_left = ld->buffer_size - words*4;
if (ld->bytes_left >= 4)
{
tmp = getdword(&ld->start[words]);
ld->bytes_left -= 4;
} else {
tmp = getdword_n(&ld->start[words], ld->bytes_left);
ld->bytes_left = 0;
}
ld->bufa = tmp;
if (ld->bytes_left >= 4)
{
tmp = getdword(&ld->start[words+1]);
ld->bytes_left -= 4;
} else {
tmp = getdword_n(&ld->start[words+1], ld->bytes_left);
ld->bytes_left = 0;
}
ld->bufb = tmp;
ld->bits_left = 32 - remainder;
ld->tail = &ld->start[words+2];
/* recheck for reading too many bytes */
ld->error = 0;
// if (ld->bytes_left == 0)
// ld->no_more_reading = 1;
// if (ld->bytes_left < 0)
// ld->error = 1;
} | 195 | True | 1 |
CVE-2021-32272 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/knik0/faad2/issues/57', 'name': 'https://github.com/knik0/faad2/issues/57', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24', 'name': 'https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.debian.org/security/2022/dsa-5109', 'name': 'DSA-5109', 'refsource': 'DEBIAN', 'tags': ['Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.10.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution.'}] | 2022-04-22T16:20Z | 2021-09-20T16:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Fabian Greffrath | 2020-08-31 10:00:37+02:00 | fix heap-buffer-overflow in mp4read.c
This originated from an integer overflow: If mp4config.frame.ents
would be read-in with a value of (uint32t)(-1), it would overflow to 0
in the size calculation for the allocation in the next line. The
malloc() function would then successfully return a pointer to a memory
region of size 0, which will cause a segfault when written to.
Fixes #57. | 1b71a6ba963d131375f5e489b3b25e36f19f3f24 | False | knik0/faad2 | Freeware Advanced Audio (AAC) Decoder faad2 mirror | 2017-07-25 07:35:55 | 2022-08-24 06:26:39 | https://sourceforge.net/projects/faac/ | knik0 | 110.0 | 46.0 | stszin | stszin( int size) | ['size'] | static int stszin(int size)
{
int cnt;
uint32_t ofs;
// version/flags
u32in();
// Sample size
u32in();
// Number of entries
mp4config.frame.ents = u32in();
// fixme: check atom size
mp4config.frame.data = malloc(sizeof(*mp4config.frame.data)
* (mp4config.frame.ents + 1));
if (!mp4config.frame.data)
return ERR_FAIL;
ofs = 0;
mp4config.frame.data[0] = ofs;
for (cnt = 0; cnt < mp4config.frame.ents; cnt++)
{
uint32_t fsize = u32in();
ofs += fsize;
if (mp4config.frame.maxsize < fsize)
mp4config.frame.maxsize = fsize;
mp4config.frame.data[cnt + 1] = ofs;
if (ofs < mp4config.frame.data[cnt])
return ERR_FAIL;
}
return size;
} | 167 | True | 1 |
CVE-2021-26567 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | LOW | NONE | UNCHANGED | HIGH | HIGH | HIGH | 8.8 | HIGH | 2.8 | 5.9 | False | [{'url': 'https://www.synology.com/security/advisory/Synology_SA_20_26', 'name': 'https://www.synology.com/security/advisory/Synology_SA_20_26', 'refsource': 'CONFIRM', 'tags': ['Vendor Advisory']}, {'url': 'https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa', 'name': 'https://github.com/knik0/faad2/commit/720f7004d6c4aabee19aad16e7c456ed76a3ebfa', 'refsource': 'MISC', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'versionEndExcluding': '6.2.3-25426-3', 'cpe_name': []}]}, {'operator': 'AND', 'children': [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': False, 'cpe23Uri': 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe_name': []}]}], 'cpe_match': []}, {'operator': 'AND', 'children': [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': False, 'cpe23Uri': 'cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*', 'cpe_name': []}]}], 'cpe_match': []}, {'operator': 'AND', 'children': [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:synology:diskstation_manager_unified_controller:3.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': False, 'cpe23Uri': 'cpe:2.3:h:synology:uc3200:-:*:*:*:*:*:*:*', 'cpe_name': []}]}], 'cpe_match': []}] | [{'lang': 'en', 'value': 'Stack-based buffer overflow vulnerability in frontend/main.c in faad2 before 2.2.7.1 allow local attackers to execute arbitrary code via filename and pathname options.'}] | 2021-03-12T14:15Z | 2021-02-26T22:15Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | knik | 2012-03-04 09:59:02+00:00 | Dynamically allocate file name buffers. | 720f7004d6c4aabee19aad16e7c456ed76a3ebfa | False | knik0/faad2 | Freeware Advanced Audio (AAC) Decoder faad2 mirror | 2017-07-25 07:35:55 | 2022-08-24 06:26:39 | https://sourceforge.net/projects/faac/ | knik0 | 110.0 | 46.0 | main | main( int argc , char * argv [ ]) | ['argc'] | int main(int argc, char *argv[])
{
int result;
int infoOnly = 0;
int writeToStdio = 0;
int readFromStdin = 0;
int object_type = LC;
int def_srate = 0;
int downMatrix = 0;
int format = 1;
int outputFormat = FAAD_FMT_16BIT;
int outfile_set = 0;
int adts_out = 0;
int old_format = 0;
int showHelp = 0;
int mp4file = 0;
int noGapless = 0;
char *fnp;
char aacFileName[255];
char audioFileName[255];
char adtsFileName[255];
unsigned char header[8];
float length = 0;
FILE *hMP4File;
/* System dependant types */
#ifdef _WIN32
long begin;
#else
clock_t begin;
#endif
unsigned long cap = NeAACDecGetCapabilities();
/* begin process command line */
progName = argv[0];
while (1) {
int c = -1;
int option_index = 0;
static struct option long_options[] = {
{ "quiet", 0, 0, 'q' },
{ "outfile", 0, 0, 'o' },
{ "adtsout", 0, 0, 'a' },
{ "oldformat", 0, 0, 't' },
{ "format", 0, 0, 'f' },
{ "bits", 0, 0, 'b' },
{ "samplerate", 0, 0, 's' },
{ "objecttype", 0, 0, 'l' },
{ "downmix", 0, 0, 'd' },
{ "info", 0, 0, 'i' },
{ "stdio", 0, 0, 'w' },
{ "stdio", 0, 0, 'g' },
{ "help", 0, 0, 'h' },
{ 0, 0, 0, 0 }
};
c = getopt_long(argc, argv, "o:a:s:f:b:l:wgdhitq",
long_options, &option_index);
if (c == -1)
break;
switch (c) {
case 'o':
if (optarg)
{
outfile_set = 1;
strcpy(audioFileName, optarg);
}
break;
case 'a':
if (optarg)
{
adts_out = 1;
strcpy(adtsFileName, optarg);
}
break;
case 's':
if (optarg)
{
char dr[10];
if (sscanf(optarg, "%s", dr) < 1) {
def_srate = 0;
} else {
def_srate = atoi(dr);
}
}
break;
case 'f':
if (optarg)
{
char dr[10];
if (sscanf(optarg, "%s", dr) < 1)
{
format = 1;
} else {
format = atoi(dr);
if ((format < 1) || (format > 2))
showHelp = 1;
}
}
break;
case 'b':
if (optarg)
{
char dr[10];
if (sscanf(optarg, "%s", dr) < 1)
{
outputFormat = FAAD_FMT_16BIT; /* just use default */
} else {
outputFormat = atoi(dr);
if ((outputFormat < 1) || (outputFormat > 5))
showHelp = 1;
}
}
break;
case 'l':
if (optarg)
{
char dr[10];
if (sscanf(optarg, "%s", dr) < 1)
{
object_type = LC; /* default */
} else {
object_type = atoi(dr);
if ((object_type != LC) &&
(object_type != MAIN) &&
(object_type != LTP) &&
(object_type != LD))
{
showHelp = 1;
}
}
}
break;
case 't':
old_format = 1;
break;
case 'd':
downMatrix = 1;
break;
case 'w':
writeToStdio = 1;
break;
case 'g':
noGapless = 1;
break;
case 'i':
infoOnly = 1;
break;
case 'h':
showHelp = 1;
break;
case 'q':
quiet = 1;
break;
default:
break;
}
}
faad_fprintf(stderr, " *********** Ahead Software MPEG-4 AAC Decoder V%s ******************\n\n", FAAD2_VERSION);
faad_fprintf(stderr, " Build: %s\n", __DATE__);
faad_fprintf(stderr, " Copyright 2002-2004: Ahead Software AG\n");
faad_fprintf(stderr, " http://www.audiocoding.com\n");
if (cap & FIXED_POINT_CAP)
faad_fprintf(stderr, " Fixed point version\n");
else
faad_fprintf(stderr, " Floating point version\n");
faad_fprintf(stderr, "\n");
faad_fprintf(stderr, " This program is free software; you can redistribute it and/or modify\n");
faad_fprintf(stderr, " it under the terms of the GNU General Public License.\n");
faad_fprintf(stderr, "\n");
faad_fprintf(stderr, " **************************************************************************\n\n");
/* check that we have at least two non-option arguments */
/* Print help if requested */
if (((argc - optind) < 1) || showHelp)
{
usage();
return 1;
}
#if 0
/* only allow raw data on stdio */
if (writeToStdio == 1)
{
format = 2;
}
#endif
/* point to the specified file name */
strcpy(aacFileName, argv[optind]);
#ifdef _WIN32
begin = GetTickCount();
#else
begin = clock();
#endif
/* Only calculate the path and open the file for writing if
we are not writing to stdout.
*/
if(!writeToStdio && !outfile_set)
{
strcpy(audioFileName, aacFileName);
fnp = (char *)strrchr(audioFileName,'.');
if (fnp)
fnp[0] = '\0';
strcat(audioFileName, file_ext[format]);
}
/* check for mp4 file */
if (0 == strcmp(aacFileName, "-")) {
faad_fprintf(stderr, "Reading from stdin: %s\n", aacFileName);
readFromStdin = 1;
hMP4File = stdin;
#ifdef _WIN32
setmode(fileno(stdin), O_BINARY);
#endif
} else {
mp4file = 0;
hMP4File = fopen(aacFileName, "rb");
if (!hMP4File)
{
faad_fprintf(stderr, "Error opening file: %s\n", aacFileName);
return 1;
}
}
fread(header, 1, 8, hMP4File);
if (! readFromStdin )
fclose(hMP4File);
if (header[4] == 'f' && header[5] == 't' && header[6] == 'y' && header[7] == 'p')
mp4file = 1;
if (mp4file)
{
result = decodeMP4file(aacFileName, audioFileName, adtsFileName, writeToStdio,
outputFormat, format, downMatrix, noGapless, infoOnly, adts_out, &length);
} else {
if (readFromStdin == 1) {
ungetc(header[7],hMP4File);
ungetc(header[6],hMP4File);
ungetc(header[5],hMP4File);
ungetc(header[4],hMP4File);
ungetc(header[3],hMP4File);
ungetc(header[2],hMP4File);
ungetc(header[1],hMP4File);
ungetc(header[0],hMP4File);
}
result = decodeAACfile(aacFileName, audioFileName, adtsFileName, writeToStdio,
def_srate, object_type, outputFormat, format, downMatrix, infoOnly, adts_out,
old_format, &length);
}
if (!result && !infoOnly)
{
#ifdef _WIN32
float dec_length = (float)(GetTickCount()-begin)/1000.0;
SetConsoleTitle("FAAD");
#else
/* clock() grabs time since the start of the app but when we decode
multiple files, each file has its own starttime (begin).
*/
float dec_length = (float)(clock() - begin)/(float)CLOCKS_PER_SEC;
#endif
faad_fprintf(stderr, "Decoding %s took: %5.2f sec. %5.2fx real-time.\n", aacFileName,
dec_length, length/dec_length);
}
return 0;
} | 1258 | True | 1 |
CVE-2019-15683 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'name': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:turbovnc:turbovnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2.3', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TurboVNC server code contains stack buffer overflow vulnerability in commit prior to cea98166008301e614e0d36776bf9435a536136e. This could possibly result into remote code execution, since stack frame is not protected with stack canary. This attack appear to be exploitable via network connectivity. To exploit this vulnerability authorization on server is required. These issues have been fixed in commit cea98166008301e614e0d36776bf9435a536136e.'}] | 2019-11-05T16:46Z | 2019-10-29T19:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | DRC | 2019-08-23 09:54:21-05:00 | Server: Fix two issues identified by ASan
1. If the TLSPlain and X509Plain security types were both disabled, then
rfbOptPamAuth() would overflow the name field in the secTypes
structure when testing the "none" security type, since the name of
that security type has less than five characters. This issue was
innocuous, since the overflow was fully contained within the secTypes
structure, but the ASan error caused Xvnc to abort, which made it
difficult to detect other errors.
2. If an ill-behaved RFB client sent the TurboVNC Server a fence
message with more than 64 bytes, then the TurboVNC Server would
try to read that message and subsequently overflow the stack before
it detected that the payload was too large. This could never have
occurred with any of the VNC viewers that currently support the RFB
flow control extensions (TigerVNC and TurboVNC, namely.) This issue
was also innocuous, since the stack overflow affected two variables
(newScreens and errMsg) that were never accessed before the function
returned. | cea98166008301e614e0d36776bf9435a536136e | False | TurboVNC/turbovnc | Main TurboVNC repository | 2015-07-29 02:17:57 | 2022-08-27 15:44:22 | https://TurboVNC.org | TurboVNC | 532.0 | 115.0 | rfbOptPamAuth | rfbOptPamAuth( void) | ['void'] | Bool rfbOptPamAuth(void)
{
SecTypeData *s;
for (s = secTypes; s->name != NULL; s++) {
if ((!strcmp(s->name, "unixlogin") ||
!strcmp(&s->name[strlen(s->name) - 5], "plain")) && s->enabled)
return TRUE;
}
return FALSE;
} | 72 | True | 1 |
CVE-2019-15683 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'name': 'https://github.com/TurboVNC/turbovnc/commit/cea98166008301e614e0d36776bf9435a536136e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:turbovnc:turbovnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2.3', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TurboVNC server code contains stack buffer overflow vulnerability in commit prior to cea98166008301e614e0d36776bf9435a536136e. This could possibly result into remote code execution, since stack frame is not protected with stack canary. This attack appear to be exploitable via network connectivity. To exploit this vulnerability authorization on server is required. These issues have been fixed in commit cea98166008301e614e0d36776bf9435a536136e.'}] | 2019-11-05T16:46Z | 2019-10-29T19:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | DRC | 2019-08-23 09:54:21-05:00 | Server: Fix two issues identified by ASan
1. If the TLSPlain and X509Plain security types were both disabled, then
rfbOptPamAuth() would overflow the name field in the secTypes
structure when testing the "none" security type, since the name of
that security type has less than five characters. This issue was
innocuous, since the overflow was fully contained within the secTypes
structure, but the ASan error caused Xvnc to abort, which made it
difficult to detect other errors.
2. If an ill-behaved RFB client sent the TurboVNC Server a fence
message with more than 64 bytes, then the TurboVNC Server would
try to read that message and subsequently overflow the stack before
it detected that the payload was too large. This could never have
occurred with any of the VNC viewers that currently support the RFB
flow control extensions (TigerVNC and TurboVNC, namely.) This issue
was also innocuous, since the stack overflow affected two variables
(newScreens and errMsg) that were never accessed before the function
returned. | cea98166008301e614e0d36776bf9435a536136e | False | TurboVNC/turbovnc | Main TurboVNC repository | 2015-07-29 02:17:57 | 2022-08-27 15:44:22 | https://TurboVNC.org | TurboVNC | 532.0 | 115.0 | rfbProcessClientNormalMessage | rfbProcessClientNormalMessage( rfbClientPtr cl) | ['cl'] | static void rfbProcessClientNormalMessage(rfbClientPtr cl)
{
int n;
rfbClientToServerMsg msg;
char *str;
READ((char *)&msg, 1)
switch (msg.type) {
case rfbSetPixelFormat:
READ(((char *)&msg) + 1, sz_rfbSetPixelFormatMsg - 1)
cl->format.bitsPerPixel = msg.spf.format.bitsPerPixel;
cl->format.depth = msg.spf.format.depth;
cl->format.bigEndian = (msg.spf.format.bigEndian ? 1 : 0);
cl->format.trueColour = (msg.spf.format.trueColour ? 1 : 0);
cl->format.redMax = Swap16IfLE(msg.spf.format.redMax);
cl->format.greenMax = Swap16IfLE(msg.spf.format.greenMax);
cl->format.blueMax = Swap16IfLE(msg.spf.format.blueMax);
cl->format.redShift = msg.spf.format.redShift;
cl->format.greenShift = msg.spf.format.greenShift;
cl->format.blueShift = msg.spf.format.blueShift;
cl->readyForSetColourMapEntries = TRUE;
rfbSetTranslateFunction(cl);
return;
case rfbFixColourMapEntries:
READ(((char *)&msg) + 1, sz_rfbFixColourMapEntriesMsg - 1)
rfbLog("rfbProcessClientNormalMessage: FixColourMapEntries unsupported\n");
rfbCloseClient(cl);
return;
case rfbSetEncodings:
{
int i;
CARD32 enc;
Bool firstFence = !cl->enableFence;
Bool firstCU = !cl->enableCU;
Bool firstGII = !cl->enableGII;
Bool logTightCompressLevel = FALSE;
READ(((char *)&msg) + 1, sz_rfbSetEncodingsMsg - 1)
msg.se.nEncodings = Swap16IfLE(msg.se.nEncodings);
cl->preferredEncoding = -1;
cl->useCopyRect = FALSE;
cl->enableCursorShapeUpdates = FALSE;
cl->enableCursorPosUpdates = FALSE;
cl->enableLastRectEncoding = FALSE;
cl->tightCompressLevel = TIGHT_DEFAULT_COMPRESSION;
cl->tightSubsampLevel = TIGHT_DEFAULT_SUBSAMP;
cl->tightQualityLevel = -1;
cl->imageQualityLevel = -1;
for (i = 0; i < msg.se.nEncodings; i++) {
READ((char *)&enc, 4)
enc = Swap32IfLE(enc);
switch (enc) {
case rfbEncodingCopyRect:
cl->useCopyRect = TRUE;
break;
case rfbEncodingRaw:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using raw encoding for client %s\n", cl->host);
}
break;
case rfbEncodingRRE:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using rre encoding for client %s\n", cl->host);
}
break;
case rfbEncodingCoRRE:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using CoRRE encoding for client %s\n", cl->host);
}
break;
case rfbEncodingHextile:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using hextile encoding for client %s\n", cl->host);
}
break;
case rfbEncodingZlib:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using zlib encoding for client %s\n", cl->host);
}
break;
case rfbEncodingZRLE:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using ZRLE encoding for client %s\n", cl->host);
}
break;
case rfbEncodingZYWRLE:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using ZYWRLE encoding for client %s\n", cl->host);
}
break;
case rfbEncodingTight:
if (cl->preferredEncoding == -1) {
cl->preferredEncoding = enc;
rfbLog("Using tight encoding for client %s\n", cl->host);
}
break;
case rfbEncodingXCursor:
if (!cl->enableCursorShapeUpdates) {
rfbLog("Enabling X-style cursor updates for client %s\n",
cl->host);
cl->enableCursorShapeUpdates = TRUE;
cl->useRichCursorEncoding = FALSE;
cl->cursorWasChanged = TRUE;
}
break;
case rfbEncodingRichCursor:
if (!cl->enableCursorShapeUpdates) {
rfbLog("Enabling full-color cursor updates for client %s\n",
cl->host);
cl->enableCursorShapeUpdates = TRUE;
cl->useRichCursorEncoding = TRUE;
cl->cursorWasChanged = TRUE;
}
break;
case rfbEncodingPointerPos:
if (!cl->enableCursorPosUpdates) {
rfbLog("Enabling cursor position updates for client %s\n",
cl->host);
cl->enableCursorPosUpdates = TRUE;
cl->cursorWasMoved = TRUE;
cl->cursorX = -1;
cl->cursorY = -1;
}
break;
case rfbEncodingLastRect:
if (!cl->enableLastRectEncoding) {
rfbLog("Enabling LastRect protocol extension for client %s\n",
cl->host);
cl->enableLastRectEncoding = TRUE;
}
break;
case rfbEncodingFence:
if (!cl->enableFence) {
rfbLog("Enabling Fence protocol extension for client %s\n",
cl->host);
cl->enableFence = TRUE;
}
break;
case rfbEncodingContinuousUpdates:
if (!cl->enableCU) {
rfbLog("Enabling Continuous Updates protocol extension for client %s\n",
cl->host);
cl->enableCU = TRUE;
}
break;
case rfbEncodingNewFBSize:
if (!cl->enableDesktopSize) {
if (!rfbAuthDisableRemoteResize) {
rfbLog("Enabling Desktop Size protocol extension for client %s\n",
cl->host);
cl->enableDesktopSize = TRUE;
} else
rfbLog("WARNING: Remote desktop resizing disabled per system policy.\n");
}
break;
case rfbEncodingExtendedDesktopSize:
if (!cl->enableExtDesktopSize) {
if (!rfbAuthDisableRemoteResize) {
rfbLog("Enabling Extended Desktop Size protocol extension for client %s\n",
cl->host);
cl->enableExtDesktopSize = TRUE;
} else
rfbLog("WARNING: Remote desktop resizing disabled per system policy.\n");
}
break;
case rfbEncodingGII:
if (!cl->enableGII) {
rfbLog("Enabling GII extension for client %s\n", cl->host);
cl->enableGII = TRUE;
}
break;
default:
if (enc >= (CARD32)rfbEncodingCompressLevel0 &&
enc <= (CARD32)rfbEncodingCompressLevel9) {
cl->zlibCompressLevel = enc & 0x0F;
cl->tightCompressLevel = enc & 0x0F;
if (cl->preferredEncoding == rfbEncodingTight)
logTightCompressLevel = TRUE;
else
rfbLog("Using compression level %d for client %s\n",
cl->tightCompressLevel, cl->host);
if (rfbInterframe == -1) {
if (cl->tightCompressLevel >= 5) {
if (!InterframeOn(cl)) {
rfbCloseClient(cl);
return;
}
} else
InterframeOff(cl);
}
} else if (enc >= (CARD32)rfbEncodingSubsamp1X &&
enc <= (CARD32)rfbEncodingSubsampGray) {
cl->tightSubsampLevel = enc & 0xFF;
rfbLog("Using JPEG subsampling %d for client %s\n",
cl->tightSubsampLevel, cl->host);
} else if (enc >= (CARD32)rfbEncodingQualityLevel0 &&
enc <= (CARD32)rfbEncodingQualityLevel9) {
cl->tightQualityLevel = JPEG_QUAL[enc & 0x0F];
cl->tightSubsampLevel = JPEG_SUBSAMP[enc & 0x0F];
cl->imageQualityLevel = enc & 0x0F;
if (cl->preferredEncoding == rfbEncodingTight)
rfbLog("Using JPEG subsampling %d, Q%d for client %s\n",
cl->tightSubsampLevel, cl->tightQualityLevel, cl->host);
else
rfbLog("Using image quality level %d for client %s\n",
cl->imageQualityLevel, cl->host);
} else if (enc >= (CARD32)rfbEncodingFineQualityLevel0 + 1 &&
enc <= (CARD32)rfbEncodingFineQualityLevel100) {
cl->tightQualityLevel = enc & 0xFF;
rfbLog("Using JPEG quality %d for client %s\n",
cl->tightQualityLevel, cl->host);
} else {
rfbLog("rfbProcessClientNormalMessage: ignoring unknown encoding %d (%x)\n",
(int)enc, (int)enc);
}
} /* switch (enc) */
} /* for (i = 0; i < msg.se.nEncodings; i++) */
if (cl->preferredEncoding == -1)
cl->preferredEncoding = rfbEncodingTight;
if (cl->preferredEncoding == rfbEncodingTight && logTightCompressLevel)
rfbLog("Using Tight compression level %d for client %s\n",
rfbTightCompressLevel(cl), cl->host);
if (cl->enableCursorPosUpdates && !cl->enableCursorShapeUpdates) {
rfbLog("Disabling cursor position updates for client %s\n", cl->host);
cl->enableCursorPosUpdates = FALSE;
}
if (cl->enableFence && firstFence) {
if (!rfbSendFence(cl, rfbFenceFlagRequest, 0, NULL))
return;
}
if (cl->enableCU && cl->enableFence && firstCU) {
if (!rfbSendEndOfCU(cl))
return;
}
if (cl->enableGII && firstGII) {
/* Send GII server version message to all clients */
rfbGIIServerVersionMsg msg;
msg.type = rfbGIIServer;
/* We always send as big endian to make things easier on the Java
viewer. */
msg.endianAndSubType = rfbGIIVersion | rfbGIIBE;
msg.length = Swap16IfLE(sz_rfbGIIServerVersionMsg - 4);
msg.maximumVersion = msg.minimumVersion = Swap16IfLE(1);
if (WriteExact(cl, (char *)&msg, sz_rfbGIIServerVersionMsg) < 0) {
rfbLogPerror("rfbProcessClientNormalMessage: write");
rfbCloseClient(cl);
return;
}
}
return;
} /* rfbSetEncodings */
case rfbFramebufferUpdateRequest:
{
RegionRec tmpRegion;
BoxRec box;
READ(((char *)&msg) + 1, sz_rfbFramebufferUpdateRequestMsg - 1)
box.x1 = Swap16IfLE(msg.fur.x);
box.y1 = Swap16IfLE(msg.fur.y);
box.x2 = box.x1 + Swap16IfLE(msg.fur.w);
box.y2 = box.y1 + Swap16IfLE(msg.fur.h);
SAFE_REGION_INIT(pScreen, &tmpRegion, &box, 0);
if (!msg.fur.incremental || !cl->continuousUpdates)
REGION_UNION(pScreen, &cl->requestedRegion, &cl->requestedRegion,
&tmpRegion);
if (!cl->readyForSetColourMapEntries) {
/* client hasn't sent a SetPixelFormat so is using server's */
cl->readyForSetColourMapEntries = TRUE;
if (!cl->format.trueColour) {
if (!rfbSetClientColourMap(cl, 0, 0)) {
REGION_UNINIT(pScreen, &tmpRegion);
return;
}
}
}
if (!msg.fur.incremental) {
REGION_UNION(pScreen, &cl->modifiedRegion, &cl->modifiedRegion,
&tmpRegion);
REGION_SUBTRACT(pScreen, &cl->copyRegion, &cl->copyRegion, &tmpRegion);
REGION_UNION(pScreen, &cl->ifRegion, &cl->ifRegion, &tmpRegion);
cl->pendingExtDesktopResize = TRUE;
}
if (FB_UPDATE_PENDING(cl) &&
(!cl->deferredUpdateScheduled || rfbDeferUpdateTime == 0 ||
gettime() - cl->deferredUpdateStart >=
(double)rfbDeferUpdateTime)) {
if (rfbSendFramebufferUpdate(cl))
cl->deferredUpdateScheduled = FALSE;
}
REGION_UNINIT(pScreen, &tmpRegion);
return;
}
case rfbKeyEvent:
cl->rfbKeyEventsRcvd++;
READ(((char *)&msg) + 1, sz_rfbKeyEventMsg - 1)
if (!rfbViewOnly && !cl->viewOnly)
KeyEvent((KeySym)Swap32IfLE(msg.ke.key), msg.ke.down);
return;
case rfbPointerEvent:
cl->rfbPointerEventsRcvd++;
READ(((char *)&msg) + 1, sz_rfbPointerEventMsg - 1)
if (pointerClient && (pointerClient != cl))
return;
if (msg.pe.buttonMask == 0)
pointerClient = NULL;
else
pointerClient = cl;
if (!rfbViewOnly && !cl->viewOnly) {
cl->cursorX = (int)Swap16IfLE(msg.pe.x);
cl->cursorY = (int)Swap16IfLE(msg.pe.y);
PtrAddEvent(msg.pe.buttonMask, cl->cursorX, cl->cursorY, cl);
}
return;
case rfbClientCutText:
{
int ignoredBytes = 0;
READ(((char *)&msg) + 1, sz_rfbClientCutTextMsg - 1)
msg.cct.length = Swap32IfLE(msg.cct.length);
if (msg.cct.length > rfbMaxClipboard) {
rfbLog("Truncating %d-byte clipboard update to %d bytes.\n",
msg.cct.length, rfbMaxClipboard);
ignoredBytes = msg.cct.length - rfbMaxClipboard;
msg.cct.length = rfbMaxClipboard;
}
if (msg.cct.length <= 0) return;
str = (char *)malloc(msg.cct.length);
if (str == NULL) {
rfbLogPerror("rfbProcessClientNormalMessage: rfbClientCutText out of memory");
rfbCloseClient(cl);
return;
}
if ((n = ReadExact(cl, str, msg.cct.length)) <= 0) {
if (n != 0)
rfbLogPerror("rfbProcessClientNormalMessage: read");
free(str);
rfbCloseClient(cl);
return;
}
if (ignoredBytes > 0) {
if ((n = SkipExact(cl, ignoredBytes)) <= 0) {
if (n != 0)
rfbLogPerror("rfbProcessClientNormalMessage: read");
free(str);
rfbCloseClient(cl);
return;
}
}
/* NOTE: We do not accept cut text from a view-only client */
if (!rfbViewOnly && !cl->viewOnly && !rfbAuthDisableCBRecv) {
vncClientCutText(str, msg.cct.length);
if (rfbSyncCutBuffer) rfbSetXCutText(str, msg.cct.length);
}
free(str);
return;
}
case rfbEnableContinuousUpdates:
{
BoxRec box;
READ(((char *)&msg) + 1, sz_rfbEnableContinuousUpdatesMsg - 1)
if (!cl->enableFence || !cl->enableCU) {
rfbLog("Ignoring request to enable continuous updates because the client does not\n");
rfbLog("support the flow control extensions.\n");
return;
}
box.x1 = Swap16IfLE(msg.ecu.x);
box.y1 = Swap16IfLE(msg.ecu.y);
box.x2 = box.x1 + Swap16IfLE(msg.ecu.w);
box.y2 = box.y1 + Swap16IfLE(msg.ecu.h);
SAFE_REGION_INIT(pScreen, &cl->cuRegion, &box, 0);
cl->continuousUpdates = msg.ecu.enable;
if (cl->continuousUpdates) {
REGION_EMPTY(pScreen, &cl->requestedRegion);
if (!rfbSendFramebufferUpdate(cl))
return;
} else {
if (!rfbSendEndOfCU(cl))
return;
}
rfbLog("Continuous updates %s\n",
cl->continuousUpdates ? "enabled" : "disabled");
return;
}
case rfbFence:
{
CARD32 flags;
char data[64];
READ(((char *)&msg) + 1, sz_rfbFenceMsg - 1)
flags = Swap32IfLE(msg.f.flags);
READ(data, msg.f.length)
if (msg.f.length > sizeof(data))
rfbLog("Ignoring fence. Payload of %d bytes is too large.\n",
msg.f.length);
else
HandleFence(cl, flags, msg.f.length, data);
return;
}
#define EDSERROR(format, args...) { \
if (!strlen(errMsg)) \
snprintf(errMsg, 256, "Desktop resize ERROR: "format"\n", args); \
result = rfbEDSResultInvalid; \
}
case rfbSetDesktopSize:
{
int i;
struct xorg_list newScreens;
rfbClientPtr cl2;
int result = rfbEDSResultSuccess;
char errMsg[256] = "\0";
ScreenPtr pScreen = screenInfo.screens[0];
READ(((char *)&msg) + 1, sz_rfbSetDesktopSizeMsg - 1)
if (msg.sds.numScreens < 1)
EDSERROR("Requested number of screens %d is invalid",
msg.sds.numScreens);
msg.sds.w = Swap16IfLE(msg.sds.w);
msg.sds.h = Swap16IfLE(msg.sds.h);
if (msg.sds.w < 1 || msg.sds.h < 1)
EDSERROR("Requested framebuffer dimensions %dx%d are invalid",
msg.sds.w, msg.sds.h);
xorg_list_init(&newScreens);
for (i = 0; i < msg.sds.numScreens; i++) {
rfbScreenInfo *screen = rfbNewScreen(0, 0, 0, 0, 0, 0);
READ((char *)&screen->s, sizeof(rfbScreenDesc))
screen->s.id = Swap32IfLE(screen->s.id);
screen->s.x = Swap16IfLE(screen->s.x);
screen->s.y = Swap16IfLE(screen->s.y);
screen->s.w = Swap16IfLE(screen->s.w);
screen->s.h = Swap16IfLE(screen->s.h);
screen->s.flags = Swap32IfLE(screen->s.flags);
if (screen->s.w < 1 || screen->s.h < 1)
EDSERROR("Screen 0x%.8x requested dimensions %dx%d are invalid",
(unsigned int)screen->s.id, screen->s.w, screen->s.h);
if (screen->s.x >= msg.sds.w || screen->s.y >= msg.sds.h ||
screen->s.x + screen->s.w > msg.sds.w ||
screen->s.y + screen->s.h > msg.sds.h)
EDSERROR("Screen 0x%.8x requested geometry %dx%d+%d+%d exceeds requested framebuffer dimensions",
(unsigned int)screen->s.id, screen->s.w, screen->s.h,
screen->s.x, screen->s.y);
if (rfbFindScreenID(&newScreens, screen->s.id)) {
EDSERROR("Screen 0x%.8x duplicate ID", (unsigned int)screen->s.id);
free(screen);
} else
rfbAddScreen(&newScreens, screen);
}
if (cl->viewOnly) {
rfbLog("NOTICE: Ignoring remote desktop resize request from a view-only client.\n");
result = rfbEDSResultProhibited;
} else if (result == rfbEDSResultSuccess) {
result = ResizeDesktop(pScreen, cl, msg.sds.w, msg.sds.h, &newScreens);
if (result == rfbEDSResultSuccess)
return;
} else
rfbLog(errMsg);
rfbRemoveScreens(&newScreens);
/* Send back the error only to the requesting client. This loop is
necessary because the client may have been shut down as a result of
an error in ResizeDesktop(). */
for (cl2 = rfbClientHead; cl2; cl2 = cl2->next) {
if (cl2 == cl) {
cl2->pendingExtDesktopResize = TRUE;
cl2->reason = rfbEDSReasonClient;
cl2->result = result;
rfbSendFramebufferUpdate(cl2);
break;
}
}
return;
}
case rfbGIIClient:
{
CARD8 endianAndSubType, littleEndian, subType;
READ((char *)&endianAndSubType, 1);
littleEndian = (endianAndSubType & rfbGIIBE) ? 0 : 1;
subType = endianAndSubType & ~rfbGIIBE;
switch (subType) {
case rfbGIIVersion:
READ((char *)&msg.giicv.length, sz_rfbGIIClientVersionMsg - 2);
if (littleEndian != *(const char *)&rfbEndianTest) {
msg.giicv.length = Swap16(msg.giicv.length);
msg.giicv.version = Swap16(msg.giicv.version);
}
if (msg.giicv.length != sz_rfbGIIClientVersionMsg - 4 ||
msg.giicv.version < 1) {
rfbLog("ERROR: Malformed GII client version message\n");
rfbCloseClient(cl);
return;
}
rfbLog("Client supports GII version %d\n", msg.giicv.version);
break;
case rfbGIIDeviceCreate:
{
int i;
rfbDevInfo dev;
rfbGIIDeviceCreatedMsg dcmsg;
memset(&dev, 0, sizeof(dev));
dcmsg.deviceOrigin = 0;
READ((char *)&msg.giidc.length, sz_rfbGIIDeviceCreateMsg - 2);
if (littleEndian != *(const char *)&rfbEndianTest) {
msg.giidc.length = Swap16(msg.giidc.length);
msg.giidc.vendorID = Swap32(msg.giidc.vendorID);
msg.giidc.productID = Swap32(msg.giidc.productID);
msg.giidc.canGenerate = Swap32(msg.giidc.canGenerate);
msg.giidc.numRegisters = Swap32(msg.giidc.numRegisters);
msg.giidc.numValuators = Swap32(msg.giidc.numValuators);
msg.giidc.numButtons = Swap32(msg.giidc.numButtons);
}
rfbLog("GII Device Create: %s\n", msg.giidc.deviceName);
#ifdef GII_DEBUG
rfbLog(" Vendor ID: %d\n", msg.giidc.vendorID);
rfbLog(" Product ID: %d\n", msg.giidc.productID);
rfbLog(" Event mask: %.8x\n", msg.giidc.canGenerate);
rfbLog(" Registers: %d\n", msg.giidc.numRegisters);
rfbLog(" Valuators: %d\n", msg.giidc.numValuators);
rfbLog(" Buttons: %d\n", msg.giidc.numButtons);
#endif
if (msg.giidc.length != sz_rfbGIIDeviceCreateMsg - 4 +
msg.giidc.numValuators * sz_rfbGIIValuator) {
rfbLog("ERROR: Malformed GII device create message\n");
rfbCloseClient(cl);
return;
}
if (msg.giidc.numButtons > MAX_BUTTONS) {
rfbLog("GII device create ERROR: %d buttons exceeds max of %d\n",
msg.giidc.numButtons, MAX_BUTTONS);
SKIP(msg.giidc.numValuators * sz_rfbGIIValuator);
goto sendMessage;
}
if (msg.giidc.numValuators > MAX_VALUATORS) {
rfbLog("GII device create ERROR: %d valuators exceeds max of %d\n",
msg.giidc.numValuators, MAX_VALUATORS);
SKIP(msg.giidc.numValuators * sz_rfbGIIValuator);
goto sendMessage;
}
memcpy(&dev.name, msg.giidc.deviceName, 32);
dev.numButtons = msg.giidc.numButtons;
dev.numValuators = msg.giidc.numValuators;
dev.eventMask = msg.giidc.canGenerate;
dev.mode =
(dev.eventMask & rfbGIIValuatorAbsoluteMask) ? Absolute : Relative;
dev.productID = msg.giidc.productID;
if (dev.mode == Relative) {
rfbLog("GII device create ERROR: relative valuators not supported (yet)\n");
SKIP(msg.giidc.numValuators * sz_rfbGIIValuator);
goto sendMessage;
}
for (i = 0; i < dev.numValuators; i++) {
rfbGIIValuator *v = &dev.valuators[i];
READ((char *)v, sz_rfbGIIValuator);
if (littleEndian != *(const char *)&rfbEndianTest) {
v->index = Swap32(v->index);
v->rangeMin = Swap32((CARD32)v->rangeMin);
v->rangeCenter = Swap32((CARD32)v->rangeCenter);
v->rangeMax = Swap32((CARD32)v->rangeMax);
v->siUnit = Swap32(v->siUnit);
v->siAdd = Swap32((CARD32)v->siAdd);
v->siMul = Swap32((CARD32)v->siMul);
v->siDiv = Swap32((CARD32)v->siDiv);
v->siShift = Swap32((CARD32)v->siShift);
}
#ifdef GII_DEBUG
rfbLog(" Valuator: %s (%s)\n", v->longName, v->shortName);
rfbLog(" Index: %d\n", v->index);
rfbLog(" Range: min = %d, center = %d, max = %d\n",
v->rangeMin, v->rangeCenter, v->rangeMax);
rfbLog(" SI unit: %d\n", v->siUnit);
rfbLog(" SI add: %d\n", v->siAdd);
rfbLog(" SI multiply: %d\n", v->siMul);
rfbLog(" SI divide: %d\n", v->siDiv);
rfbLog(" SI shift: %d\n", v->siShift);
#endif
}
for (i = 0; i < cl->numDevices; i++) {
if (!strcmp(dev.name, cl->devices[i].name)) {
rfbLog("Device \'%s\' already exists with GII device ID %d\n",
dev.name, i + 1);
dcmsg.deviceOrigin = Swap32IfLE(i + 1);
goto sendMessage;
}
}
if (rfbVirtualTablet || AddExtInputDevice(&dev)) {
memcpy(&cl->devices[cl->numDevices], &dev, sizeof(dev));
cl->numDevices++;
dcmsg.deviceOrigin = Swap32IfLE(cl->numDevices);
}
rfbLog("GII device ID = %d\n", cl->numDevices);
sendMessage:
/* Send back a GII device created message */
dcmsg.type = rfbGIIServer;
/* We always send as big endian to make things easier on the Java
viewer. */
dcmsg.endianAndSubType = rfbGIIDeviceCreate | rfbGIIBE;
dcmsg.length = Swap16IfLE(sz_rfbGIIDeviceCreatedMsg - 4);
if (WriteExact(cl, (char *)&dcmsg, sz_rfbGIIDeviceCreatedMsg) < 0) {
rfbLogPerror("rfbProcessClientNormalMessage: write");
rfbCloseClient(cl);
return;
}
break;
}
case rfbGIIDeviceDestroy:
READ((char *)&msg.giidd.length, sz_rfbGIIDeviceDestroyMsg - 2);
if (littleEndian != *(const char *)&rfbEndianTest) {
msg.giidd.length = Swap16(msg.giidd.length);
msg.giidd.deviceOrigin = Swap32(msg.giidd.deviceOrigin);
}
if (msg.giidd.length != sz_rfbGIIDeviceDestroyMsg - 4) {
rfbLog("ERROR: Malformed GII device create message\n");
rfbCloseClient(cl);
return;
}
RemoveExtInputDevice(cl, msg.giidd.deviceOrigin - 1);
break;
case rfbGIIEvent:
{
CARD16 length;
READ((char *)&length, sizeof(CARD16));
if (littleEndian != *(const char *)&rfbEndianTest)
length = Swap16(length);
while (length > 0) {
CARD8 eventSize, eventType;
READ((char *)&eventSize, 1);
READ((char *)&eventType, 1);
switch (eventType) {
case rfbGIIButtonPress:
case rfbGIIButtonRelease:
{
rfbGIIButtonEvent b;
rfbDevInfo *dev;
READ((char *)&b.pad, sz_rfbGIIButtonEvent - 2);
if (littleEndian != *(const char *)&rfbEndianTest) {
b.deviceOrigin = Swap32(b.deviceOrigin);
b.buttonNumber = Swap32(b.buttonNumber);
}
if (eventSize != sz_rfbGIIButtonEvent || b.deviceOrigin <= 0 ||
b.buttonNumber < 1) {
rfbLog("ERROR: Malformed GII button event\n");
rfbCloseClient(cl);
return;
}
if (eventSize > length) {
rfbLog("ERROR: Malformed GII event message\n");
rfbCloseClient(cl);
return;
}
length -= eventSize;
if (b.deviceOrigin < 1 || b.deviceOrigin > cl->numDevices) {
rfbLog("ERROR: GII button event from non-existent device %d\n",
b.deviceOrigin);
rfbCloseClient(cl);
return;
}
dev = &cl->devices[b.deviceOrigin - 1];
if ((eventType == rfbGIIButtonPress &&
(dev->eventMask & rfbGIIButtonPressMask) == 0) ||
(eventType == rfbGIIButtonRelease &&
(dev->eventMask & rfbGIIButtonReleaseMask) == 0)) {
rfbLog("ERROR: Device %d can't generate GII button events\n",
b.deviceOrigin);
rfbCloseClient(cl);
return;
}
if (b.buttonNumber > dev->numButtons) {
rfbLog("ERROR: GII button %d event for device %d exceeds button count (%d)\n",
b.buttonNumber, b.deviceOrigin, dev->numButtons);
rfbCloseClient(cl);
return;
}
#ifdef GII_DEBUG
rfbLog("Device %d button %d %s\n", b.deviceOrigin,
b.buttonNumber,
eventType == rfbGIIButtonPress ? "PRESS" : "release");
fflush(stderr);
#endif
ExtInputAddEvent(dev, eventType == rfbGIIButtonPress ?
ButtonPress : ButtonRelease, b.buttonNumber);
break;
}
case rfbGIIValuatorRelative:
case rfbGIIValuatorAbsolute:
{
rfbGIIValuatorEvent v;
int i;
rfbDevInfo *dev;
READ((char *)&v.pad, sz_rfbGIIValuatorEvent - 2);
if (littleEndian != *(const char *)&rfbEndianTest) {
v.deviceOrigin = Swap32(v.deviceOrigin);
v.first = Swap32(v.first);
v.count = Swap32(v.count);
}
if (eventSize !=
sz_rfbGIIValuatorEvent + sizeof(int) * v.count) {
rfbLog("ERROR: Malformed GII valuator event\n");
rfbCloseClient(cl);
return;
}
if (eventSize > length) {
rfbLog("ERROR: Malformed GII event message\n");
rfbCloseClient(cl);
return;
}
length -= eventSize;
if (v.deviceOrigin < 1 || v.deviceOrigin > cl->numDevices) {
rfbLog("ERROR: GII valuator event from non-existent device %d\n",
v.deviceOrigin);
rfbCloseClient(cl);
return;
}
dev = &cl->devices[v.deviceOrigin - 1];
if ((eventType == rfbGIIValuatorRelative &&
(dev->eventMask & rfbGIIValuatorRelativeMask) == 0) ||
(eventType == rfbGIIValuatorAbsolute &&
(dev->eventMask & rfbGIIValuatorAbsoluteMask) == 0)) {
rfbLog("ERROR: Device %d cannot generate GII valuator events\n",
v.deviceOrigin);
rfbCloseClient(cl);
return;
}
if (v.first + v.count > dev->numValuators) {
rfbLog("ERROR: GII valuator event for device %d exceeds valuator count (%d)\n",
v.deviceOrigin, dev->numValuators);
rfbCloseClient(cl);
return;
}
#ifdef GII_DEBUG
rfbLog("Device %d Valuator %s first=%d count=%d:\n",
v.deviceOrigin,
eventType == rfbGIIValuatorRelative ? "rel" : "ABS",
v.first, v.count);
#endif
for (i = v.first; i < v.first + v.count; i++) {
READ((char *)&dev->values[i], sizeof(int));
if (littleEndian != *(const char *)&rfbEndianTest)
dev->values[i] = Swap32((CARD32)dev->values[i]);
#ifdef GII_DEBUG
fprintf(stderr, "v[%d]=%d ", i, dev->values[i]);
#endif
}
#ifdef GII_DEBUG
fprintf(stderr, "\n");
#endif
if (v.count > 0) {
dev->valFirst = v.first;
dev->valCount = v.count;
dev->mode = eventType == rfbGIIValuatorAbsolute ?
Absolute : Relative;
ExtInputAddEvent(dev, MotionNotify, 0);
}
break;
}
default:
rfbLog("ERROR: This server cannot handle GII event type %d\n",
eventType);
rfbCloseClient(cl);
return;
} /* switch (eventType) */
} /* while (length > 0) */
if (length != 0) {
rfbLog("ERROR: Malformed GII event message\n");
rfbCloseClient(cl);
return;
}
break;
} /* rfbGIIEvent */
} /* switch (subType) */
return;
} /* rfbGIIClient */
default:
rfbLog("rfbProcessClientNormalMessage: unknown message type %d\n",
msg.type);
rfbLog(" ... closing connection\n");
rfbCloseClient(cl);
return;
} /* switch (msg.type) */
} | 5240 | True | 1 |
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::deinit | ZlibInStream::deinit() | [] | void ZlibInStream::deinit()
{
assert(zs != NULL);
removeUnderlying();
inflateEnd(zs);
delete zs;
zs = NULL;
} | 30 | True | 1 |
|
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::overrun | ZlibInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int ZlibInStream::overrun(int itemSize, int nItems, bool wait)
{
if (itemSize > bufSize)
throw Exception("ZlibInStream overrun: max itemSize exceeded");
if (!underlying)
throw Exception("ZlibInStream overrun: no underlying stream");
if (end - ptr != 0)
memmove(start, ptr, end - ptr);
offset += ptr - start;
end -= ptr - start;
ptr = start;
while (end - ptr < itemSize) {
if (!decompress(wait))
return 0;
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 117 | True | 1 |
|
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::removeUnderlying | ZlibInStream::removeUnderlying() | [] | void ZlibInStream::removeUnderlying()
{
ptr = end = start;
if (!underlying) return;
while (bytesIn > 0) {
decompress(true);
end = start; // throw away any data
}
underlying = 0;
} | 41 | True | 1 |
|
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | CMsgReader::readExtendedClipboard | CMsgReader::readExtendedClipboard( rdr :: S32 len) | ['len'] | void CMsgReader::readExtendedClipboard(rdr::S32 len)
{
rdr::U32 flags;
rdr::U32 action;
if (len < 4)
throw Exception("Invalid extended clipboard message");
if (len > maxCutText) {
vlog.error("Extended clipboard message too long (%d bytes) - ignoring", len);
is->skip(len);
return;
}
flags = is->readU32();
action = flags & clipboardActionMask;
if (action & clipboardCaps) {
int i;
size_t num;
rdr::U32 lengths[16];
num = 0;
for (i = 0;i < 16;i++) {
if (flags & (1 << i))
num++;
}
if (len < (rdr::S32)(4 + 4*num))
throw Exception("Invalid extended clipboard message");
num = 0;
for (i = 0;i < 16;i++) {
if (flags & (1 << i))
lengths[num++] = is->readU32();
}
handler->handleClipboardCaps(flags, lengths);
} else if (action == clipboardProvide) {
rdr::ZlibInStream zis;
int i;
size_t num;
size_t lengths[16];
rdr::U8* buffers[16];
zis.setUnderlying(is, len - 4);
num = 0;
for (i = 0;i < 16;i++) {
if (!(flags & 1 << i))
continue;
lengths[num] = zis.readU32();
if (lengths[num] > (size_t)maxCutText) {
vlog.error("Extended clipboard data too long (%d bytes) - ignoring",
(unsigned)lengths[num]);
zis.skip(lengths[num]);
flags &= ~(1 << i);
continue;
}
buffers[num] = new rdr::U8[lengths[num]];
zis.readBytes(buffers[num], lengths[num]);
num++;
}
zis.removeUnderlying();
handler->handleClipboardProvide(flags, lengths, buffers);
num = 0;
for (i = 0;i < 16;i++) {
if (!(flags & 1 << i))
continue;
delete [] buffers[num++];
}
} else {
switch (action) {
case clipboardRequest:
handler->handleClipboardRequest(flags);
break;
case clipboardPeek:
handler->handleClipboardPeek(flags);
break;
case clipboardNotify:
handler->handleClipboardNotify(flags);
break;
default:
throw Exception("Invalid extended clipboard action");
}
}
} | 488 | True | 1 |
|
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | SMsgReader::readExtendedClipboard | SMsgReader::readExtendedClipboard( rdr :: S32 len) | ['len'] | void SMsgReader::readExtendedClipboard(rdr::S32 len)
{
rdr::U32 flags;
rdr::U32 action;
if (len < 4)
throw Exception("Invalid extended clipboard message");
if (len > maxCutText) {
vlog.error("Extended clipboard message too long (%d bytes) - ignoring", len);
is->skip(len);
return;
}
flags = is->readU32();
action = flags & clipboardActionMask;
if (action & clipboardCaps) {
int i;
size_t num;
rdr::U32 lengths[16];
num = 0;
for (i = 0;i < 16;i++) {
if (flags & (1 << i))
num++;
}
if (len < (rdr::S32)(4 + 4*num))
throw Exception("Invalid extended clipboard message");
num = 0;
for (i = 0;i < 16;i++) {
if (flags & (1 << i))
lengths[num++] = is->readU32();
}
handler->handleClipboardCaps(flags, lengths);
} else if (action == clipboardProvide) {
rdr::ZlibInStream zis;
int i;
size_t num;
size_t lengths[16];
rdr::U8* buffers[16];
zis.setUnderlying(is, len - 4);
num = 0;
for (i = 0;i < 16;i++) {
if (!(flags & 1 << i))
continue;
lengths[num] = zis.readU32();
if (lengths[num] > (size_t)maxCutText) {
vlog.error("Extended clipboard data too long (%d bytes) - ignoring",
(unsigned)lengths[num]);
zis.skip(lengths[num]);
flags &= ~(1 << i);
continue;
}
buffers[num] = new rdr::U8[lengths[num]];
zis.readBytes(buffers[num], lengths[num]);
num++;
}
zis.removeUnderlying();
handler->handleClipboardProvide(flags, lengths, buffers);
num = 0;
for (i = 0;i < 16;i++) {
if (!(flags & 1 << i))
continue;
delete [] buffers[num++];
}
} else {
switch (action) {
case clipboardRequest:
handler->handleClipboardRequest(flags);
break;
case clipboardPeek:
handler->handleClipboardPeek(flags);
break;
case clipboardNotify:
handler->handleClipboardNotify(flags);
break;
default:
throw Exception("Invalid extended clipboard action");
}
}
} | 488 | True | 1 |
|
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TightDecoder::decodeRect | TightDecoder::decodeRect( const Rect & r , const void * buffer , size_t buflen , const ServerParams & server , ModifiablePixelBuffer * pb) | ['r', 'buffer', 'buflen', 'server', 'pb'] | void TightDecoder::decodeRect(const Rect& r, const void* buffer,
size_t buflen, const ServerParams& server,
ModifiablePixelBuffer* pb)
{
const rdr::U8* bufptr;
const PixelFormat& pf = server.pf();
rdr::U8 comp_ctl;
bufptr = (const rdr::U8*)buffer;
assert(buflen >= 1);
comp_ctl = *bufptr;
bufptr += 1;
buflen -= 1;
// Reset zlib streams if we are told by the server to do so.
for (int i = 0; i < 4; i++) {
if (comp_ctl & 1) {
zis[i].reset();
}
comp_ctl >>= 1;
}
// "Fill" compression type.
if (comp_ctl == tightFill) {
if (pf.is888()) {
rdr::U8 pix[4];
assert(buflen >= 3);
pf.bufferFromRGB(pix, bufptr, 1);
pb->fillRect(pf, r, pix);
} else {
assert(buflen >= (size_t)pf.bpp/8);
pb->fillRect(pf, r, bufptr);
}
return;
}
// "JPEG" compression type.
if (comp_ctl == tightJpeg) {
rdr::U32 len;
int stride;
rdr::U8 *buf;
JpegDecompressor jd;
assert(buflen >= 4);
memcpy(&len, bufptr, 4);
bufptr += 4;
buflen -= 4;
// We always use direct decoding with JPEG images
buf = pb->getBufferRW(r, &stride);
jd.decompress(bufptr, len, buf, stride, r, pb->getPF());
pb->commitBufferRW(r);
return;
}
// Quit on unsupported compression type.
assert(comp_ctl <= tightMaxSubencoding);
// "Basic" compression type.
int palSize = 0;
rdr::U8 palette[256 * 4];
bool useGradient = false;
if ((comp_ctl & tightExplicitFilter) != 0) {
rdr::U8 filterId;
assert(buflen >= 1);
filterId = *bufptr;
bufptr += 1;
buflen -= 1;
switch (filterId) {
case tightFilterPalette:
assert(buflen >= 1);
palSize = *bufptr + 1;
bufptr += 1;
buflen -= 1;
if (pf.is888()) {
size_t len = palSize * 3;
rdr::U8Array tightPalette(len);
assert(buflen >= len);
memcpy(tightPalette.buf, bufptr, len);
bufptr += len;
buflen -= len;
pf.bufferFromRGB(palette, tightPalette.buf, palSize);
} else {
size_t len;
len = palSize * pf.bpp/8;
assert(buflen >= len);
memcpy(palette, bufptr, len);
bufptr += len;
buflen -= len;
}
break;
case tightFilterGradient:
useGradient = true;
break;
case tightFilterCopy:
break;
default:
assert(false);
}
}
// Determine if the data should be decompressed or just copied.
size_t rowSize, dataSize;
rdr::U8* netbuf;
netbuf = NULL;
if (palSize != 0) {
if (palSize <= 2)
rowSize = (r.width() + 7) / 8;
else
rowSize = r.width();
} else if (pf.is888()) {
rowSize = r.width() * 3;
} else {
rowSize = r.width() * pf.bpp/8;
}
dataSize = r.height() * rowSize;
if (dataSize < TIGHT_MIN_TO_COMPRESS)
assert(buflen >= dataSize);
else {
rdr::U32 len;
int streamId;
rdr::MemInStream* ms;
assert(buflen >= 4);
memcpy(&len, bufptr, 4);
bufptr += 4;
buflen -= 4;
assert(buflen >= len);
streamId = comp_ctl & 0x03;
ms = new rdr::MemInStream(bufptr, len);
zis[streamId].setUnderlying(ms, len);
// Allocate buffer and decompress the data
netbuf = new rdr::U8[dataSize];
zis[streamId].readBytes(netbuf, dataSize);
zis[streamId].removeUnderlying();
delete ms;
bufptr = netbuf;
buflen = dataSize;
}
// Time to decode the actual data
bool directDecode;
rdr::U8* outbuf;
int stride;
if (pb->getPF().equal(pf)) {
// Decode directly into the framebuffer (fast path)
directDecode = true;
} else {
// Decode into an intermediate buffer and use pixel translation
directDecode = false;
}
if (directDecode)
outbuf = pb->getBufferRW(r, &stride);
else {
outbuf = new rdr::U8[r.area() * (pf.bpp/8)];
stride = r.width();
}
if (palSize == 0) {
// Truecolor data
if (useGradient) {
if (pf.is888())
FilterGradient24(bufptr, pf, (rdr::U32*)outbuf, stride, r);
else {
switch (pf.bpp) {
case 8:
assert(false);
break;
case 16:
FilterGradient(bufptr, pf, (rdr::U16*)outbuf, stride, r);
break;
case 32:
FilterGradient(bufptr, pf, (rdr::U32*)outbuf, stride, r);
break;
}
}
} else {
// Copy
rdr::U8* ptr = outbuf;
const rdr::U8* srcPtr = bufptr;
int w = r.width();
int h = r.height();
if (pf.is888()) {
while (h > 0) {
pf.bufferFromRGB(ptr, srcPtr, w);
ptr += stride * pf.bpp/8;
srcPtr += w * 3;
h--;
}
} else {
while (h > 0) {
memcpy(ptr, srcPtr, w * pf.bpp/8);
ptr += stride * pf.bpp/8;
srcPtr += w * pf.bpp/8;
h--;
}
}
}
} else {
// Indexed color
switch (pf.bpp) {
case 8:
FilterPalette((const rdr::U8*)palette, palSize,
bufptr, (rdr::U8*)outbuf, stride, r);
break;
case 16:
FilterPalette((const rdr::U16*)palette, palSize,
bufptr, (rdr::U16*)outbuf, stride, r);
break;
case 32:
FilterPalette((const rdr::U32*)palette, palSize,
bufptr, (rdr::U32*)outbuf, stride, r);
break;
}
}
if (directDecode)
pb->commitBufferRW(r);
else {
pb->imageRect(pf, r, outbuf);
delete [] outbuf;
}
delete [] netbuf;
} | 1229 | True | 1 |
|
CVE-2019-15691 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'name': 'https://github.com/CendioOssman/tigervnc/commit/d61a767d6842b530ffb532ddd5a3d233119aad40', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-672'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Operation on a Resource after Expiration or Release | The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | https://cwe.mitre.org/data/definitions/672.html | 0 | Pierre Ossman | 2019-09-10 11:05:48+02:00 | Make ZlibInStream more robust against failures
Move the checks around to avoid missing cases where we might access
memory that is no longer valid. Also avoid touching the underlying
stream implicitly (e.g. via the destructor) as it might also no
longer be valid.
A malicious server could theoretically use this for remote code
execution in the client.
Issue found by Pavel Cheremushkin from Kaspersky Lab | d61a767d6842b530ffb532ddd5a3d233119aad40 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rfb::ZRLE_DECODE | rfb::ZRLE_DECODE( const Rect & r , rdr :: InStream * is , rdr :: ZlibInStream * zis , const PixelFormat & pf , ModifiablePixelBuffer * pb) | ['r', 'is', 'zis', 'pf', 'pb'] | void ZRLE_DECODE (const Rect& r, rdr::InStream* is,
rdr::ZlibInStream* zis,
const PixelFormat& pf, ModifiablePixelBuffer* pb)
{
int length = is->readU32();
zis->setUnderlying(is, length);
Rect t;
PIXEL_T buf[64 * 64];
for (t.tl.y = r.tl.y; t.tl.y < r.br.y; t.tl.y += 64) {
t.br.y = __rfbmin(r.br.y, t.tl.y + 64);
for (t.tl.x = r.tl.x; t.tl.x < r.br.x; t.tl.x += 64) {
t.br.x = __rfbmin(r.br.x, t.tl.x + 64);
int mode = zis->readU8();
bool rle = mode & 128;
int palSize = mode & 127;
PIXEL_T palette[128];
for (int i = 0; i < palSize; i++) {
palette[i] = READ_PIXEL(zis);
}
if (palSize == 1) {
PIXEL_T pix = palette[0];
pb->fillRect(pf, t, &pix);
continue;
}
if (!rle) {
if (palSize == 0) {
// raw
#ifdef CPIXEL
for (PIXEL_T* ptr = buf; ptr < buf+t.area(); ptr++) {
*ptr = READ_PIXEL(zis);
}
#else
zis->readBytes(buf, t.area() * (BPP / 8));
#endif
} else {
// packed pixels
int bppp = ((palSize > 16) ? 8 :
((palSize > 4) ? 4 : ((palSize > 2) ? 2 : 1)));
PIXEL_T* ptr = buf;
for (int i = 0; i < t.height(); i++) {
PIXEL_T* eol = ptr + t.width();
rdr::U8 byte = 0;
rdr::U8 nbits = 0;
while (ptr < eol) {
if (nbits == 0) {
byte = zis->readU8();
nbits = 8;
}
nbits -= bppp;
rdr::U8 index = (byte >> nbits) & ((1 << bppp) - 1) & 127;
*ptr++ = palette[index];
}
}
}
} else {
if (palSize == 0) {
// plain RLE
PIXEL_T* ptr = buf;
PIXEL_T* end = ptr + t.area();
while (ptr < end) {
PIXEL_T pix = READ_PIXEL(zis);
int len = 1;
int b;
do {
b = zis->readU8();
len += b;
} while (b == 255);
if (end - ptr < len) {
throw Exception ("ZRLE decode error");
}
while (len-- > 0) *ptr++ = pix;
}
} else {
// palette RLE
PIXEL_T* ptr = buf;
PIXEL_T* end = ptr + t.area();
while (ptr < end) {
int index = zis->readU8();
int len = 1;
if (index & 128) {
int b;
do {
b = zis->readU8();
len += b;
} while (b == 255);
if (end - ptr < len) {
throw Exception ("ZRLE decode error");
}
}
index &= 127;
PIXEL_T pix = palette[index];
while (len-- > 0) *ptr++ = pix;
}
}
}
pb->imageRect(pf, t, buf);
}
}
zis->removeUnderlying();
} | 721 | True | 1 |
|
CVE-2019-15693 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'name': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-10 15:36:42+02:00 | Handle empty Tight gradient rects
We always assumed there would be one pixel per row so a rect with
a zero width would result in us writing to unknown memory.
This could theoretically be used by a malicious server to inject
code in to the viewer process.
Issue found by Pavel Cheremushkin from Kaspersky Lab. | b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rfb::TightDecoder::FilterGradient | rfb::TightDecoder::FilterGradient( const rdr :: U8 * inbuf , const PixelFormat & pf , PIXEL_T * outbuf , int stride , const Rect & r) | ['inbuf', 'pf', 'outbuf', 'stride', 'r'] | void TightDecoder::FilterGradient(const rdr::U8* inbuf,
const PixelFormat& pf, PIXEL_T* outbuf,
int stride, const Rect& r)
{
int x, y, c;
static rdr::U8 prevRow[TIGHT_MAX_WIDTH*3];
static rdr::U8 thisRow[TIGHT_MAX_WIDTH*3];
rdr::U8 pix[3];
int est[3];
memset(prevRow, 0, sizeof(prevRow));
// Set up shortcut variables
int rectHeight = r.height();
int rectWidth = r.width();
for (y = 0; y < rectHeight; y++) {
/* First pixel in a row */
pf.rgbFromBuffer(pix, &inbuf[y*rectWidth], 1);
for (c = 0; c < 3; c++)
pix[c] += prevRow[c];
memcpy(thisRow, pix, sizeof(pix));
pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride], pix, 1);
/* Remaining pixels of a row */
for (x = 1; x < rectWidth; x++) {
for (c = 0; c < 3; c++) {
est[c] = prevRow[x*3+c] + pix[c] - prevRow[(x-1)*3+c];
if (est[c] > 255) {
est[c] = 255;
} else if (est[c] < 0) {
est[c] = 0;
}
}
pf.rgbFromBuffer(pix, &inbuf[y*rectWidth+x], 1);
for (c = 0; c < 3; c++)
pix[c] += est[c];
memcpy(&thisRow[x*3], pix, sizeof(pix));
pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride+x], pix, 1);
}
memcpy(prevRow, thisRow, sizeof(prevRow));
}
} | 389 | True | 1 |
CVE-2019-15693 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'name': 'https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-01-21T22:15Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-10 15:36:42+02:00 | Handle empty Tight gradient rects
We always assumed there would be one pixel per row so a rect with
a zero width would result in us writing to unknown memory.
This could theoretically be used by a malicious server to inject
code in to the viewer process.
Issue found by Pavel Cheremushkin from Kaspersky Lab. | b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rfb::TightDecoder::FilterGradient24 | rfb::TightDecoder::FilterGradient24( const rdr :: U8 * inbuf , const PixelFormat & pf , PIXEL_T * outbuf , int stride , const Rect & r) | ['inbuf', 'pf', 'outbuf', 'stride', 'r'] | TightDecoder::FilterGradient24(const rdr::U8 *inbuf,
const PixelFormat& pf, PIXEL_T* outbuf,
int stride, const Rect& r)
{
int x, y, c;
rdr::U8 prevRow[TIGHT_MAX_WIDTH*3];
rdr::U8 thisRow[TIGHT_MAX_WIDTH*3];
rdr::U8 pix[3];
int est[3];
memset(prevRow, 0, sizeof(prevRow));
// Set up shortcut variables
int rectHeight = r.height();
int rectWidth = r.width();
for (y = 0; y < rectHeight; y++) {
/* First pixel in a row */
for (c = 0; c < 3; c++) {
pix[c] = inbuf[y*rectWidth*3+c] + prevRow[c];
thisRow[c] = pix[c];
}
pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride], pix, 1);
/* Remaining pixels of a row */
for (x = 1; x < rectWidth; x++) {
for (c = 0; c < 3; c++) {
est[c] = prevRow[x*3+c] + pix[c] - prevRow[(x-1)*3+c];
if (est[c] > 0xff) {
est[c] = 0xff;
} else if (est[c] < 0) {
est[c] = 0;
}
pix[c] = inbuf[(y*rectWidth+x)*3+c] + est[c];
thisRow[x*3+c] = pix[c];
}
pf.bufferFromRGB((rdr::U8*)&outbuf[y*stride+x], pix, 1);
}
memcpy(prevRow, thisRow, sizeof(prevRow));
}
} | 360 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdInStream::FdInStream | FdInStream::FdInStream( int fd_ , FdInStreamBlockCallback * blockCallback_ , int bufSize_) | ['fd_', 'blockCallback_', 'bufSize_'] | FdInStream::FdInStream(int fd_, FdInStreamBlockCallback* blockCallback_,
int bufSize_)
: fd(fd_), timeoutms(0), blockCallback(blockCallback_),
timing(false), timeWaitedIn100us(5), timedKbits(0),
bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0)
{
ptr = end = start = new U8[bufSize];
} | 72 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdInStream::FdInStream | FdInStream::FdInStream( int fd_ , int timeoutms_ , int bufSize_ , bool closeWhenDone_) | ['fd_', 'timeoutms_', 'bufSize_', 'closeWhenDone_'] | FdInStream::FdInStream(int fd_, int timeoutms_, int bufSize_,
bool closeWhenDone_)
: fd(fd_), closeWhenDone(closeWhenDone_),
timeoutms(timeoutms_), blockCallback(0),
timing(false), timeWaitedIn100us(5), timedKbits(0),
bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0)
{
ptr = end = start = new U8[bufSize];
} | 79 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdInStream::overrun | FdInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int FdInStream::overrun(int itemSize, int nItems, bool wait)
{
if (itemSize > bufSize)
throw Exception("FdInStream overrun: max itemSize exceeded");
if (end - ptr != 0)
memmove(start, ptr, end - ptr);
offset += ptr - start;
end -= ptr - start;
ptr = start;
int bytes_to_read;
while (end < start + itemSize) {
bytes_to_read = start + bufSize - end;
if (!timing) {
// When not timing, we must be careful not to read too much
// extra data into the buffer. Otherwise, the line speed
// estimation might stay at zero for a long time: All reads
// during timing=1 can be satisfied without calling
// readWithTimeoutOrCallback. However, reading only 1 or 2 bytes
// bytes is ineffecient.
bytes_to_read = vncmin(bytes_to_read, vncmax(itemSize*nItems, 8));
}
int n = readWithTimeoutOrCallback((U8*)end, bytes_to_read, wait);
if (n == 0) return 0;
end += n;
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 158 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdInStream::pos | FdInStream::pos() | [] | int FdInStream::pos()
{
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdInStream::readBytes | FdInStream::readBytes( void * data , int length) | ['data', 'length'] | void FdInStream::readBytes(void* data, int length)
{
if (length < MIN_BULK_SIZE) {
InStream::readBytes(data, length);
return;
}
U8* dataPtr = (U8*)data;
int n = end - ptr;
if (n > length) n = length;
memcpy(dataPtr, ptr, n);
dataPtr += n;
length -= n;
ptr += n;
while (length > 0) {
n = readWithTimeoutOrCallback(dataPtr, length);
dataPtr += n;
length -= n;
offset += n;
}
} | 109 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdInStream::readWithTimeoutOrCallback | FdInStream::readWithTimeoutOrCallback( void * buf , int len , bool wait) | ['buf', 'len', 'wait'] | int FdInStream::readWithTimeoutOrCallback(void* buf, int len, bool wait)
{
struct timeval before, after;
if (timing)
gettimeofday(&before, 0);
int n;
while (true) {
do {
fd_set fds;
struct timeval tv;
struct timeval* tvp = &tv;
if (!wait) {
tv.tv_sec = tv.tv_usec = 0;
} else if (timeoutms != -1) {
tv.tv_sec = timeoutms / 1000;
tv.tv_usec = (timeoutms % 1000) * 1000;
} else {
tvp = 0;
}
FD_ZERO(&fds);
FD_SET(fd, &fds);
n = select(fd+1, &fds, 0, 0, tvp);
} while (n < 0 && errno == EINTR);
if (n > 0) break;
if (n < 0) throw SystemException("select",errno);
if (!wait) return 0;
if (!blockCallback) throw TimedOut();
blockCallback->blockCallback();
}
do {
n = ::recv(fd, (char*)buf, len, 0);
} while (n < 0 && errno == EINTR);
if (n < 0) throw SystemException("read",errno);
if (n == 0) throw EndOfStream();
if (timing) {
gettimeofday(&after, 0);
int newTimeWaited = ((after.tv_sec - before.tv_sec) * 10000 +
(after.tv_usec - before.tv_usec) / 100);
int newKbits = n * 8 / 1000;
// limit rate to between 10kbit/s and 40Mbit/s
if (newTimeWaited > newKbits*1000) newTimeWaited = newKbits*1000;
if (newTimeWaited < newKbits/4) newTimeWaited = newKbits/4;
timeWaitedIn100us += newTimeWaited;
timedKbits += newKbits;
}
return n;
} | 352 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdOutStream::FdOutStream | FdOutStream::FdOutStream( int fd_ , bool blocking_ , int timeoutms_ , int bufSize_) | ['fd_', 'blocking_', 'timeoutms_', 'bufSize_'] | FdOutStream::FdOutStream(int fd_, bool blocking_, int timeoutms_, int bufSize_)
: fd(fd_), blocking(blocking_), timeoutms(timeoutms_),
bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0)
{
ptr = start = sentUpTo = new U8[bufSize];
end = start + bufSize;
gettimeofday(&lastWrite, NULL);
} | 73 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdOutStream::flush | FdOutStream::flush() | [] | void FdOutStream::flush()
{
while (sentUpTo < ptr) {
int n = writeWithTimeout((const void*) sentUpTo,
ptr - sentUpTo,
blocking? timeoutms : 0);
// Timeout?
if (n == 0) {
// If non-blocking then we're done here
if (!blocking)
break;
throw TimedOut();
}
sentUpTo += n;
offset += n;
}
// Managed to flush everything?
if (sentUpTo == ptr)
ptr = sentUpTo = start;
} | 78 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdOutStream::length | FdOutStream::length() | [] | int FdOutStream::length()
{
return offset + ptr - sentUpTo;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdOutStream::overrun | FdOutStream::overrun( int itemSize , int nItems) | ['itemSize', 'nItems'] | int FdOutStream::overrun(int itemSize, int nItems)
{
if (itemSize > bufSize)
throw Exception("FdOutStream overrun: max itemSize exceeded");
// First try to get rid of the data we have
flush();
// Still not enough space?
if (itemSize > end - ptr) {
// Can we shuffle things around?
// (don't do this if it gains us less than 25%)
if ((sentUpTo - start > bufSize / 4) &&
(itemSize < bufSize - (ptr - sentUpTo))) {
memmove(start, sentUpTo, ptr - sentUpTo);
ptr = start + (ptr - sentUpTo);
sentUpTo = start;
} else {
// Have to get rid of more data, so turn off non-blocking
// for a bit...
bool realBlocking;
realBlocking = blocking;
blocking = true;
flush();
blocking = realBlocking;
}
}
// Can we fit all the items asked for?
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 134 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FdOutStream::writeWithTimeout | FdOutStream::writeWithTimeout( const void * data , int length , int timeoutms) | ['data', 'length', 'timeoutms'] | int FdOutStream::writeWithTimeout(const void* data, int length, int timeoutms)
{
int n;
do {
fd_set fds;
struct timeval tv;
struct timeval* tvp = &tv;
if (timeoutms != -1) {
tv.tv_sec = timeoutms / 1000;
tv.tv_usec = (timeoutms % 1000) * 1000;
} else {
tvp = NULL;
}
FD_ZERO(&fds);
FD_SET(fd, &fds);
n = select(fd+1, 0, &fds, 0, tvp);
} while (n < 0 && errno == EINTR);
if (n < 0)
throw SystemException("select", errno);
if (n == 0)
return 0;
do {
// select only guarantees that you can write SO_SNDLOWAT without
// blocking, which is normally 1. Use MSG_DONTWAIT to avoid
// blocking, when possible.
#ifndef MSG_DONTWAIT
n = ::send(fd, (const char*)data, length, 0);
#else
n = ::send(fd, (const char*)data, length, MSG_DONTWAIT);
#endif
} while (n < 0 && (errno == EINTR));
if (n < 0)
throw SystemException("write", errno);
gettimeofday(&lastWrite, NULL);
return n;
} | 219 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FileInStream::overrun | FileInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int FileInStream::overrun(int itemSize, int nItems, bool wait)
{
if (itemSize > (int)sizeof(b))
throw Exception("FileInStream overrun: max itemSize exceeded");
if (end - ptr != 0)
memmove(b, ptr, end - ptr);
end -= ptr - b;
ptr = b;
while (end < b + itemSize) {
size_t n = fread((U8 *)end, b + sizeof(b) - end, 1, file);
if (n == 0) {
if (ferror(file))
throw SystemException("fread", errno);
if (feof(file))
throw EndOfStream();
return 0;
}
end += b + sizeof(b) - end;
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 169 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | FileInStream::pos | FileInStream::pos() | [] | int FileInStream::pos()
{
if (!file)
throw Exception("File is not open");
return ftell(file) + ptr - b;
} | 28 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexInStream::HexInStream | HexInStream::HexInStream( InStream & is , int bufSize_) | ['is', 'bufSize_'] | HexInStream::HexInStream(InStream& is, int bufSize_)
: bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_LEN), offset(0), in_stream(is)
{
ptr = end = start = new U8[bufSize];
} | 44 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexInStream::hexStrToBin | HexInStream::hexStrToBin( const char * s , char ** data , int * length) | ['s', 'data', 'length'] | bool HexInStream::hexStrToBin(const char* s, char** data, int* length) {
int l=strlen(s);
if ((l % 2) == 0) {
delete [] *data;
*data = 0; *length = 0;
if (l == 0)
return true;
*data = new char[l/2];
*length = l/2;
for(int i=0;i<l;i+=2) {
int byte = 0;
if (!readHexAndShift(s[i], &byte) ||
!readHexAndShift(s[i+1], &byte))
goto decodeError;
(*data)[i/2] = byte;
}
return true;
}
decodeError:
delete [] *data;
*data = 0;
*length = 0;
return false;
} | 171 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexInStream::overrun | HexInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int HexInStream::overrun(int itemSize, int nItems, bool wait) {
if (itemSize > bufSize)
throw Exception("HexInStream overrun: max itemSize exceeded");
if (end - ptr != 0)
memmove(start, ptr, end - ptr);
end -= ptr - start;
offset += ptr - start;
ptr = start;
while (end < ptr + itemSize) {
int n = in_stream.check(2, 1, wait);
if (n == 0) return 0;
const U8* iptr = in_stream.getptr();
const U8* eptr = in_stream.getend();
int length = min((eptr - iptr)/2, start + bufSize - end);
U8* optr = (U8*) end;
for (int i=0; i<length; i++) {
int v = 0;
readHexAndShift(iptr[i*2], &v);
readHexAndShift(iptr[i*2+1], &v);
optr[i] = v;
}
in_stream.setptr(iptr + length*2);
end += length;
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 241 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexInStream::pos | HexInStream::pos() | [] | int HexInStream::pos() {
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexOutStream::HexOutStream | HexOutStream::HexOutStream( OutStream & os , int buflen) | ['os', 'buflen'] | HexOutStream::HexOutStream(OutStream& os, int buflen)
: out_stream(os), offset(0), bufSize(buflen ? buflen : DEFAULT_BUF_LEN)
{
if (bufSize % 2)
bufSize--;
ptr = start = new U8[bufSize];
end = start + bufSize;
} | 57 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexOutStream::binToHexStr | HexOutStream::binToHexStr( const char * data , int length) | ['data', 'length'] | char* HexOutStream::binToHexStr(const char* data, int length) {
char* buffer = new char[length*2+1];
for (int i=0; i<length; i++) {
buffer[i*2] = intToHex((data[i] >> 4) & 15);
buffer[i*2+1] = intToHex((data[i] & 15));
if (!buffer[i*2] || !buffer[i*2+1]) {
delete [] buffer;
return 0;
}
}
buffer[length*2] = 0;
return buffer;
} | 129 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexOutStream::length | HexOutStream::length() | [] | int HexOutStream::length()
{
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexOutStream::overrun | HexOutStream::overrun( int itemSize , int nItems) | ['itemSize', 'nItems'] | HexOutStream::overrun(int itemSize, int nItems) {
if (itemSize > bufSize)
throw Exception("HexOutStream overrun: max itemSize exceeded");
writeBuffer();
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 51 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | HexOutStream::writeBuffer | HexOutStream::writeBuffer() | [] | HexOutStream::writeBuffer() {
U8* pos = start;
while (pos != ptr) {
out_stream.check(2);
U8* optr = out_stream.getptr();
U8* oend = out_stream.getend();
int length = min(ptr-pos, (oend-optr)/2);
for (int i=0; i<length; i++) {
optr[i*2] = intToHex((pos[i] >> 4) & 0xf);
optr[i*2+1] = intToHex(pos[i] & 0xf);
}
out_stream.setptr(optr + length*2);
pos += length;
}
offset += ptr - start;
ptr = start;
} | 148 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | min | min( int a , int b) | ['a', 'b'] | static inline int min(int a, int b) {return a<b ? a : b;} | 19 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::InStream::check | rdr::InStream::check( int itemSize , int nItems = 1 , bool wait = true) | ['itemSize', 'nItems', 'wait'] | inline int check(int itemSize, int nItems=1, bool wait=true)
{
if (ptr + itemSize * nItems > end) {
if (ptr + itemSize > end)
return overrun(itemSize, nItems, wait);
nItems = (end - ptr) / itemSize;
}
return nItems;
} | 60 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::InStream::checkNoWait | rdr::InStream::checkNoWait( int length) | ['length'] | inline bool checkNoWait(int length) { return check(length, 1, false)!=0; } | 19 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::InStream::readBytes | rdr::InStream::readBytes( void * data , int length) | ['data', 'length'] | void readBytes(void* data, int length) {
U8* dataPtr = (U8*)data;
U8* dataEnd = dataPtr + length;
while (dataPtr < dataEnd) {
int n = check(1, dataEnd - dataPtr);
memcpy(dataPtr, ptr, n);
ptr += n;
dataPtr += n;
}
} | 66 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::InStream::skip | rdr::InStream::skip( int bytes) | ['bytes'] | inline void skip(int bytes) {
while (bytes > 0) {
int n = check(1, bytes);
ptr += n;
bytes -= n;
}
} | 33 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemInStream::MemInStream | rdr::MemInStream::MemInStream( const void * data , int len , bool deleteWhenDone_ = false) | ['data', 'len', 'deleteWhenDone_'] | MemInStream(const void* data, int len, bool deleteWhenDone_=false)
: start((const U8*)data), deleteWhenDone(deleteWhenDone_)
{
ptr = start;
end = start + len;
} | 42 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemInStream::overrun | rdr::MemInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int overrun(int itemSize, int nItems, bool wait) { throw EndOfStream(); } | 18 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemInStream::pos | rdr::MemInStream::pos() | [] | int pos() { return ptr - start; } | 10 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemInStream::reposition | rdr::MemInStream::reposition( int pos) | ['pos'] | void reposition(int pos) { ptr = start + pos; } | 13 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemOutStream::length | rdr::MemOutStream::length() | [] | int length() { return ptr - start; } | 10 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemOutStream::overrun | rdr::MemOutStream::overrun( int itemSize , int nItems) | ['itemSize', 'nItems'] | int overrun(int itemSize, int nItems) {
int len = ptr - start + itemSize * nItems;
if (len < (end - start) * 2)
len = (end - start) * 2;
U8* newStart = new U8[len];
memcpy(newStart, start, ptr - start);
ptr = newStart + (ptr - start);
delete [] start;
start = newStart;
end = newStart + len;
return nItems;
} | 92 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemOutStream::reposition | rdr::MemOutStream::reposition( int pos) | ['pos'] | void reposition(int pos) { ptr = start + pos; } | 13 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::MemOutStream::writeBytes | rdr::MemOutStream::writeBytes( const void * data , int length) | ['data', 'length'] | void writeBytes(const void* data, int length) {
check(length);
memcpy(ptr, data, length);
ptr += length;
} | 30 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::OutStream::check | rdr::OutStream::check( int itemSize , int nItems = 1) | ['itemSize', 'nItems'] | inline int check(int itemSize, int nItems=1)
{
if (ptr + itemSize * nItems > end) {
if (ptr + itemSize > end)
return overrun(itemSize, nItems);
nItems = (end - ptr) / itemSize;
}
return nItems;
} | 53 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::OutStream::copyBytes | rdr::OutStream::copyBytes( InStream * is , int length) | ['is', 'length'] | void copyBytes(InStream* is, int length) {
while (length > 0) {
int n = check(1, length);
is->readBytes(ptr, n);
ptr += n;
length -= n;
}
} | 46 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::OutStream::pad | rdr::OutStream::pad( int bytes) | ['bytes'] | inline void pad(int bytes) {
while (bytes-- > 0) writeU8(0);
} | 19 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::OutStream::skip | rdr::OutStream::skip( int bytes) | ['bytes'] | inline void skip(int bytes) {
while (bytes > 0) {
int n = check(1, bytes);
ptr += n;
bytes -= n;
}
} | 33 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rdr::OutStream::writeBytes | rdr::OutStream::writeBytes( const void * data , int length) | ['data', 'length'] | void writeBytes(const void* data, int length) {
const U8* dataPtr = (const U8*)data;
const U8* dataEnd = dataPtr + length;
while (dataPtr < dataEnd) {
int n = check(1, dataEnd - dataPtr);
memcpy(ptr, dataPtr, n);
ptr += n;
dataPtr += n;
}
} | 70 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSInStream::overrun | TLSInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int TLSInStream::overrun(int itemSize, int nItems, bool wait)
{
if (itemSize > bufSize)
throw Exception("TLSInStream overrun: max itemSize exceeded");
if (end - ptr != 0)
memmove(start, ptr, end - ptr);
offset += ptr - start;
end -= ptr - start;
ptr = start;
while (end < start + itemSize) {
int n = readTLS((U8*) end, start + bufSize - end, wait);
if (!wait && n == 0)
return 0;
end += n;
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 131 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSInStream::pos | TLSInStream::pos() | [] | int TLSInStream::pos()
{
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSInStream::readTLS | TLSInStream::readTLS( U8 * buf , int len , bool wait) | ['buf', 'len', 'wait'] | int TLSInStream::readTLS(U8* buf, int len, bool wait)
{
int n;
n = in->check(1, 1, wait);
if (n == 0)
return 0;
n = gnutls_record_recv(session, (void *) buf, len);
if (n == GNUTLS_E_INTERRUPTED || n == GNUTLS_E_AGAIN)
return 0;
if (n < 0) throw TLSException("readTLS", n);
return n;
} | 86 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSOutStream::flush | TLSOutStream::flush() | [] | void TLSOutStream::flush()
{
U8* sentUpTo = start;
while (sentUpTo < ptr) {
int n = writeTLS(sentUpTo, ptr - sentUpTo);
sentUpTo += n;
offset += n;
}
ptr = start;
out->flush();
} | 51 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSOutStream::length | TLSOutStream::length() | [] | int TLSOutStream::length()
{
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSOutStream::overrun | TLSOutStream::overrun( int itemSize , int nItems) | ['itemSize', 'nItems'] | int TLSOutStream::overrun(int itemSize, int nItems)
{
if (itemSize > bufSize)
throw Exception("TLSOutStream overrun: max itemSize exceeded");
flush();
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 51 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | TLSOutStream::writeTLS | TLSOutStream::writeTLS( const U8 * data , int length) | ['data', 'length'] | int TLSOutStream::writeTLS(const U8* data, int length)
{
int n;
n = gnutls_record_send(session, data, length);
if (n == GNUTLS_E_INTERRUPTED || n == GNUTLS_E_AGAIN)
return 0;
if (n < 0)
throw TLSException("writeTLS", n);
return n;
} | 58 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::ZlibInStream | ZlibInStream::ZlibInStream( int bufSize_) | ['bufSize_'] | ZlibInStream::ZlibInStream(int bufSize_)
: underlying(0), bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0),
zs(NULL), bytesIn(0)
{
ptr = end = start = new U8[bufSize];
init();
} | 54 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::decompress | ZlibInStream::decompress( bool wait) | ['wait'] | bool ZlibInStream::decompress(bool wait)
{
if (!underlying)
throw Exception("ZlibInStream overrun: no underlying stream");
zs->next_out = (U8*)end;
zs->avail_out = start + bufSize - end;
int n = underlying->check(1, 1, wait);
if (n == 0) return false;
zs->next_in = (U8*)underlying->getptr();
zs->avail_in = underlying->getend() - underlying->getptr();
if ((int)zs->avail_in > bytesIn)
zs->avail_in = bytesIn;
int rc = inflate(zs, Z_SYNC_FLUSH);
if (rc != Z_OK) {
throw Exception("ZlibInStream: inflate failed");
}
bytesIn -= zs->next_in - underlying->getptr();
end = zs->next_out;
underlying->setptr(zs->next_in);
return true;
} | 164 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::overrun | ZlibInStream::overrun( int itemSize , int nItems , bool wait) | ['itemSize', 'nItems', 'wait'] | int ZlibInStream::overrun(int itemSize, int nItems, bool wait)
{
if (itemSize > bufSize)
throw Exception("ZlibInStream overrun: max itemSize exceeded");
if (end - ptr != 0)
memmove(start, ptr, end - ptr);
offset += ptr - start;
end -= ptr - start;
ptr = start;
while (end - ptr < itemSize) {
if (!decompress(wait))
return 0;
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 106 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::pos | ZlibInStream::pos() | [] | int ZlibInStream::pos()
{
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibInStream::setUnderlying | ZlibInStream::setUnderlying( InStream * is , int bytesIn_) | ['is', 'bytesIn_'] | void ZlibInStream::setUnderlying(InStream* is, int bytesIn_)
{
underlying = is;
bytesIn = bytesIn_;
ptr = end = start;
} | 27 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibOutStream::ZlibOutStream | ZlibOutStream::ZlibOutStream( OutStream * os , int bufSize_ , int compressLevel) | ['os', 'bufSize_', 'compressLevel'] | ZlibOutStream::ZlibOutStream(OutStream* os, int bufSize_, int compressLevel)
: underlying(os), compressionLevel(compressLevel), newLevel(compressLevel),
bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0)
{
zs = new z_stream;
zs->zalloc = Z_NULL;
zs->zfree = Z_NULL;
zs->opaque = Z_NULL;
zs->next_in = Z_NULL;
zs->avail_in = 0;
if (deflateInit(zs, compressLevel) != Z_OK) {
delete zs;
throw Exception("ZlibOutStream: deflateInit failed");
}
ptr = start = new U8[bufSize];
end = start + bufSize;
} | 118 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibOutStream::length | ZlibOutStream::length() | [] | int ZlibOutStream::length()
{
return offset + ptr - start;
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ZlibOutStream::overrun | ZlibOutStream::overrun( int itemSize , int nItems) | ['itemSize', 'nItems'] | int ZlibOutStream::overrun(int itemSize, int nItems)
{
#ifdef ZLIBOUT_DEBUG
vlog.debug("overrun");
#endif
if (itemSize > bufSize)
throw Exception("ZlibOutStream overrun: max itemSize exceeded");
checkCompressionLevel();
while (end - ptr < itemSize) {
zs->next_in = start;
zs->avail_in = ptr - start;
deflate(Z_NO_FLUSH);
// output buffer not full
if (zs->avail_in == 0) {
offset += ptr - start;
ptr = start;
} else {
// but didn't consume all the data? try shifting what's left to the
// start of the buffer.
vlog.info("z out buf not full, but in data not consumed");
memmove(start, zs->next_in, ptr - zs->next_in);
offset += zs->next_in - start;
ptr -= zs->next_in - start;
}
}
if (itemSize * nItems > end - ptr)
nItems = (end - ptr) / itemSize;
return nItems;
} | 148 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | BinaryParameter::BinaryParameter | BinaryParameter::BinaryParameter( const char * name_ , const char * desc_ , const void * v , int l , ConfigurationObject co) | ['name_', 'desc_', 'v', 'l', 'co'] | BinaryParameter::BinaryParameter(const char* name_, const char* desc_,
const void* v, int l, ConfigurationObject co)
: VoidParameter(name_, desc_, co), value(0), length(0), def_value((char*)v), def_length(l) {
if (l) {
value = new char[l];
length = l;
memcpy(value, v, l);
}
} | 87 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | BinaryParameter::getData | BinaryParameter::getData( void ** data_ , int * length_) const | ['data_', 'length_'] | void BinaryParameter::getData(void** data_, int* length_) const {
LOCK_CONFIG;
if (length_) *length_ = length;
if (data_) {
*data_ = new char[length];
memcpy(*data_, value, length);
}
} | 51 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | BinaryParameter::setParam | BinaryParameter::setParam( const void * v , int len) | ['v', 'len'] | void BinaryParameter::setParam(const void* v, int len) {
LOCK_CONFIG;
if (immutable) return;
vlog.debug("set %s(Binary)", getName());
delete [] value; value = 0;
if (len) {
value = new char[len];
length = len;
memcpy(value, v, len);
}
} | 69 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ObfuscatedPasswd::ObfuscatedPasswd | ObfuscatedPasswd::ObfuscatedPasswd( const PlainPasswd & plainPwd) | ['plainPwd'] | ObfuscatedPasswd::ObfuscatedPasswd(const PlainPasswd& plainPwd) : CharArray(8), length(8) {
int l = strlen(plainPwd.buf), i;
for (i=0; i<8; i++)
buf[i] = i<l ? plainPwd.buf[i] : 0;
deskey(d3desObfuscationKey, EN0);
des((rdr::U8*)buf, (rdr::U8*)buf);
} | 90 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | ObfuscatedPasswd::ObfuscatedPasswd | ObfuscatedPasswd::ObfuscatedPasswd( int len) | ['len'] | ObfuscatedPasswd::ObfuscatedPasswd(int len) : CharArray(len), length(len) {
} | 19 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | PlainPasswd::PlainPasswd | PlainPasswd::PlainPasswd( int len) | ['len'] | PlainPasswd::PlainPasswd(int len) : CharArray(len) {
} | 14 | True | 1 |
CVE-2019-15694 | False | False | False | False | AV:N/AC:L/Au:S/C:P/I:P/A:P | NETWORK | LOW | SINGLE | PARTIAL | PARTIAL | PARTIAL | 6.5 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | HIGH | NONE | UNCHANGED | HIGH | HIGH | HIGH | 7.2 | HIGH | 1.2 | 5.9 | False | [{'url': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'name': 'https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1', 'refsource': 'MISC', 'tags': ['Release Notes', 'Third Party Advisory']}, {'url': 'https://www.openwall.com/lists/oss-security/2019/12/20/2', 'name': '[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update', 'refsource': 'MLIST', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'name': 'https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html', 'name': 'openSUSE-SU-2020:0087', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.10.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.'}] | 2020-10-16T20:00Z | 2019-12-26T15:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Pierre Ossman | 2019-09-23 11:00:17+02:00 | Use size_t for lengths in stream objects
Provides safety against them accidentally becoming negative because
of bugs in the calculations.
Also does the same to CharArray and friends as they were strongly
connection to the stream objects. | 0943c006c7d900dfc0281639e992791d6c567438 | False | CendioOssman/tigervnc | null | 2014-07-03 12:14:02 | 2022-08-25 12:52:23 | null | CendioOssman | 8.0 | 1.0 | rfb::CharArray::CharArray | rfb::CharArray::CharArray( int len) | ['len'] | CharArray(int len) {
buf = new char[len]();
} | 17 | True | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.