Security update for tightvnc
Announcement ID: | SUSE-SU-2019:14235-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities can now be installed.
Description:
This update for tightvnc fixes the following issues:
- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection which might lead to code execution (bsc#1155476).
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler (bsc#1155442).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-tightvnc-14235=1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-tightvnc-14235=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-tightvnc-14235=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- tightvnc-1.3.9-81.15.3.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64 i586)
- tightvnc-1.3.9-81.15.3.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64 i586)
- tightvnc-1.3.9-81.15.3.1
References:
- https://www.suse.com/security/cve/CVE-2019-15678.html
- https://www.suse.com/security/cve/CVE-2019-15679.html
- https://www.suse.com/security/cve/CVE-2019-15680.html
- https://www.suse.com/security/cve/CVE-2019-8287.html
- https://bugzilla.suse.com/show_bug.cgi?id=1155442
- https://bugzilla.suse.com/show_bug.cgi?id=1155452
- https://bugzilla.suse.com/show_bug.cgi?id=1155472
- https://bugzilla.suse.com/show_bug.cgi?id=1155476