cvelist/2018/7xxx/CVE-2018-7225.json
2019-03-17 21:43:41 +00:00

92 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-7225",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4221",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4221"
},
{
"name": "USN-3618-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3618-1/"
},
{
"name": "https://github.com/LibVNC/libvncserver/issues/218",
"refsource": "MISC",
"url": "https://github.com/LibVNC/libvncserver/issues/218"
},
{
"name": "[debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html"
},
{
"name": "103107",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103107"
},
{
"name": "http://www.openwall.com/lists/oss-security/2018/02/18/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2018/02/18/1"
},
{
"name": "RHSA-2018:1055",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1055"
}
]
}
}