CVE-2019-8287

NameCVE-2019-8287
DescriptionTightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2045-1
Debian Bugs945364

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tightvnc (PTS)jessie, jessie (lts)1.3.9-6.5+deb8u1fixed
stretch1:1.3.9-9+deb9u1fixed
buster1:1.3.9-9+deb10u1fixed
bullseye1:1.3.10-3fixed
bookworm1:1.3.10-7fixed
sid, trixie1:1.3.10-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tightvncsourcewheezy(unfixed)end-of-life
tightvncsourcejessie1.3.9-6.5+deb8u1DLA-2045-1
tightvncsourcestretch1:1.3.9-9+deb9u1
tightvncsourcebuster1:1.3.9-9deb10u1
tightvncsource(unstable)1:1.3.9-9.1945364

Notes

https://www.openwall.com/lists/oss-security/2018/12/10/5
same as CVE-2018-20020/libvncserver

Search for package or bug name: Reporting problems