SB2017022806 - Remote code execution in gtk-vnc
Published: February 28, 2017 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2017-5884)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
gtk-vnc before 0.7.0 does not properly check boundaries of subrectangle-containing tiles, which allows remote servers to execute arbitrary code via the src x, y coordinates in a crafted (1) rre, (2) hextile, or (3) copyrect tile.2) Integer overflow (CVE-ID: CVE-2017-5885)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
Multiple integer overflows in the (1) vnc_connection_server_message and (2) vnc_color_map_set functions in gtk-vnc before 0.7.0 allow remote servers to cause a denial of service (crash) or possibly execute arbitrary code via vectors involving SetColorMapEntries, which triggers a buffer overflow.Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2017/02/03/5
- http://www.openwall.com/lists/oss-security/2017/02/05/5
- http://www.securityfocus.com/bid/96016
- https://access.redhat.com/errata/RHSA-2017:2258
- https://bugzilla.gnome.org/show_bug.cgi?id=778048
- https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178aaea9f2f85049ea3fa3e14a
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LGPQ5MQR6SN4DYTEFACHP2PP5RR26KYK/
- https://bugzilla.gnome.org/show_bug.cgi?id=778050
- https://git.gnome.org/browse/gtk-vnc/commit/?id=c8583fd3783c5b811590fcb7bae4ce6e7344963e