CVE-2017-5885

Publication date 7 February 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

Multiple integer overflows in the (1) vnc_connection_server_message and (2) vnc_color_map_set functions in gtk-vnc before 0.7.0 allow remote servers to cause a denial of service (crash) or possibly execute arbitrary code via vectors involving SetColorMapEntries, which triggers a buffer overflow.

Status

Package Ubuntu Release Status
gtk-vnc 16.10 yakkety
Fixed 0.6.0-1ubuntu1.1
16.04 LTS xenial
Fixed 0.5.3-1.3ubuntu2.1
14.04 LTS trusty
Fixed 0.5.3-0ubuntu2.1
12.04 LTS precise
Fixed 0.5.0-1ubuntu1.1

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gtk-vnc

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3203-1
    • gtk-vnc vulnerabilities
    • 20 February 2017

Other references