Errata overview
Errata ID 655
Date 2020-03-11
Source package tightvnc
Fixed in version 1:1.3.9-9+deb9u1
Description
This update addresses the following issues:
* Server NULL pointer dereference flaw in ClientCutText message handling
  (CVE-2014-6053)
* Improper input sanitization in rfbProcessClientNormalMessage in rfbserver.c
  (CVE-2018-7225)
* Infinite loop in VNC client code allows for denial of service
  (CVE-2018-20021)
* Improper initialization in VNC client code allows for information
  disclosure (CVE-2018-20022)
* TightVNC contains global buffer overflow in HandleCoRREBBP macro function,
  which can potentially result code execution. This attack appear to be
  exploitable via network connectivity. (CVE-2019-8287)
* TightVNC contains heap buffer overflow in rfbServerCutText handler, which
  can potentially result code execution.. This attack appear to be
  exploitable via network connectivity. (CVE-2019-15678)
* TightVNC contains heap buffer overflow in InitialiseRFBConnection function,
  which can potentially result code execution. This attack appear to be
  exploitable via network connectivity. (CVE-2019-15679)
* TightVNC contains null pointer dereference in HandleZlibBPP function, which
  results Denial of System (DoS). This attack appear to be exploitable via
  network connectivity. (CVE-2019-15680)
* LibVNC contains a memory leak (CWE-655) in VNC server code, which allow an
  attacker to read stack memory and can be abused for information disclosure.
  Combined with another vulnerability, it can be used to leak stack memory
  and bypass ASLR. This attack appear to be exploitable via network
  connectivity. These vulnerabilities have been fixed. (CVE-2019-15681)
Additional notes
CVE ID CVE-2014-6053
CVE-2018-7225
CVE-2018-20021
CVE-2018-20022
CVE-2019-8287
CVE-2019-15678
CVE-2019-15679
CVE-2019-15680
CVE-2019-15681
UCS Bug number #50913