TigerVNC: Integer overflow — GLSA 201612-36

An integer overflow in TigerVNC might allow remote attackers to execute arbitrary code.

Affected packages

net-misc/tigervnc on all architectures
Affected versions < 1.4.2
Unaffected versions >= 1.4.2

Background

TigerVNC is a high-performance VNC server/client.

Description

TigerVNC is impacted by the same vulnerability as found in CVE-2014-6051. An integer overflow, leading to a heap-based buffer overflow, was found in the way screen sizes were handled.

Impact

A remote attacker, utilizing a malicious VNC server, could execute arbitrary code with the privileges of the user running the client, or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All TigerVNC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/tigervnc-1.4.2"
 

References

Release date
December 13, 2016

Latest revision
December 13, 2016: 2

Severity
normal

Exploitable
remote

Bugzilla entries