mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
127 lines
4.5 KiB
JSON
127 lines
4.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2018-7225",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "DSA-4221",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4221"
|
|
},
|
|
{
|
|
"name": "USN-3618-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3618-1/"
|
|
},
|
|
{
|
|
"name": "https://github.com/LibVNC/libvncserver/issues/218",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/LibVNC/libvncserver/issues/218"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html"
|
|
},
|
|
{
|
|
"name": "103107",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/103107"
|
|
},
|
|
{
|
|
"name": "http://www.openwall.com/lists/oss-security/2018/02/18/1",
|
|
"refsource": "MISC",
|
|
"url": "http://www.openwall.com/lists/oss-security/2018/02/18/1"
|
|
},
|
|
{
|
|
"name": "RHSA-2018:1055",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:1055"
|
|
},
|
|
{
|
|
"refsource": "GENTOO",
|
|
"name": "GLSA-201908-05",
|
|
"url": "https://security.gentoo.org/glsa/201908-05"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html"
|
|
},
|
|
{
|
|
"refsource": "UBUNTU",
|
|
"name": "USN-4547-1",
|
|
"url": "https://usn.ubuntu.com/4547-1/"
|
|
},
|
|
{
|
|
"refsource": "UBUNTU",
|
|
"name": "USN-4573-1",
|
|
"url": "https://usn.ubuntu.com/4573-1/"
|
|
},
|
|
{
|
|
"refsource": "UBUNTU",
|
|
"name": "USN-4587-1",
|
|
"url": "https://usn.ubuntu.com/4587-1/"
|
|
}
|
|
]
|
|
}
|
|
} |