TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 04:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-478893.pdf - | |
| References | () https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html - | |
| References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-343-08 - | |
| References | () https://usn.ubuntu.com/4407-1/ - | |
| References | () https://www.openwall.com/lists/oss-security/2018/12/10/5 - Mailing List, Third Party Advisory | 
Information
                Published : 2019-10-29 19:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15680
Mitre link : CVE-2019-15680
CVE.ORG link : CVE-2019-15680
JSON object : View
Products Affected
                tightvnc
- tightvnc
CWE
                
                    
                        
                        CWE-476
                        
            NULL Pointer Dereference
