Vulnerability Name:

CVE-2014-6053

Assigned:2014-09-01
Published:2014-09-23
Updated:2016-12-21
Summary:The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
6.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-19
CWE-476
References:Source: SUSE
Type: UNKNOWN
http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html

Source: MLIST
Type: VENDOR_ADVISORY
http://seclists.org/oss-sec/2014/q3/639

Source: UBUNTU
Type: VENDOR_ADVISORY
http://ubuntu.com/usn/usn-2365-1

Source: DEBIAN
Type: VENDOR_ADVISORY
http://www.debian.org/security/2014/dsa-3081

Source: MISC
Type: VENDOR_ADVISORY
http://www.ocert.org/advisories/ocert-2014-007.html

Source: MLIST
Type: VENDOR_ADVISORY
http://www.openwall.com/lists/oss-security/2014/09/25/11

Source: CONFIRM
Type: PATCH
https://github.com/newsoft/libvncserver/commit/6037a9074d52b1963c97cb28ea1096c7c14cbf28

Source: GENTOO
Type: UNKNOWN
https://security.gentoo.org/glsa/201507-07

Vulnerable Configuration:Configuration 1:
  • cpe:/a:libvncserver:libvncserver:0.9.9:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20146053
    V
    CVE-2014-6053
    2017-09-24
    oval:org.mitre.oval:def:28219
    P
    ELSA-2014-1827 -- kdenetwork security update (moderate)
    2015-02-23
    oval:org.mitre.oval:def:28039
    P
    RHSA-2014:1827 -- kdenetwork security update (Moderate)
    2015-02-23
    oval:org.mitre.oval:def:28422
    P
    DSA-3081-1 -- libvncserver security update
    2015-01-26
    oval:org.mitre.oval:def:28208
    P
    RHSA-2014:1826 -- libvncserver security update (Moderate)
    2015-01-26
    oval:org.mitre.oval:def:28316
    P
    ELSA-2014-1826 -- libvncserver security update (moderate)
    2014-12-29
    oval:com.ubuntu.precise:def:20146053000
    V
    CVE-2014-6053 on Ubuntu 12.04 LTS (precise) - medium.
    2014-12-15
    oval:com.ubuntu.trusty:def:20146053000
    V
    CVE-2014-6053 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-12-15
    oval:org.mitre.oval:def:27178
    P
    USN-2365-1 -- libvncserver vulnerabilities
    2014-12-01
    oval:com.redhat.rhsa:def:20141826
    P
    RHSA-2014:1826: libvncserver security update (Moderate)
    2014-11-11
    oval:com.redhat.rhsa:def:20141827
    P
    RHSA-2014:1827: kdenetwork security update (Moderate)
    2014-11-11
    BACK
    libvncserver libvncserver 0.9.9
    canonical ubuntu_linux 12.04
    canonical ubuntu_linux 14.04
    debian debian_linux 7.0
    redhat enterprise_linux 7
    redhat enterprise_linux 6