Packages
- libvncserver - vnc server library
Details
It was discovered that LibVNCServer incorrectly handled decompressing data. An
attacker could possibly use this issue to cause LibVNCServer to crash,
resulting in a denial of service. (CVE-2019-15680)
It was discovered that an information disclosure vulnerability existed in
LibVNCServer when sending a ServerCutText message. An attacker could possibly
use this issue to expose sensitive information. This issue only affected
Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS. (CVE-2019-15681)
It was discovered that LibVNCServer incorrectly handled cursor shape updates.
If a user were tricked in to connecting to a malicious server, an attacker
could possibly use this issue to cause LibVNCServer to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04...
It was discovered that LibVNCServer incorrectly handled decompressing data. An
attacker could possibly use this issue to cause LibVNCServer to crash,
resulting in a denial of service. (CVE-2019-15680)
It was discovered that an information disclosure vulnerability existed in
LibVNCServer when sending a ServerCutText message. An attacker could possibly
use this issue to expose sensitive information. This issue only affected
Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS. (CVE-2019-15681)
It was discovered that LibVNCServer incorrectly handled cursor shape updates.
If a user were tricked in to connecting to a malicious server, an attacker
could possibly use this issue to cause LibVNCServer to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS.
(CVE-2019-15690, CVE-2019-20788)
It was discovered that LibVNCServer incorrectly handled decoding WebSocket
frames. An attacker could possibly use this issue to cause LibVNCServer to
crash, resulting in a denial of service, or possibly execute arbitrary code.
This issue only affected Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS.
(CVE-2017-18922)
Update instructions
After a standard system update you need to restart LibVNCServer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
20.04 focal | libvncclient1 – 0.9.12+dfsg-9ubuntu0.1 | ||
libvncserver1 – 0.9.12+dfsg-9ubuntu0.1 | |||
19.10 eoan | libvncclient1 – 0.9.11+dfsg-1.3ubuntu0.1 | ||
libvncserver1 – 0.9.11+dfsg-1.3ubuntu0.1 | |||
18.04 bionic | libvncclient1 – 0.9.11+dfsg-1ubuntu1.2 | ||
libvncserver1 – 0.9.11+dfsg-1ubuntu1.2 | |||
16.04 xenial | libvncclient1 – 0.9.10+dfsg-3ubuntu0.16.04.4 | ||
libvncserver1 – 0.9.10+dfsg-3ubuntu0.16.04.4 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.