Heap-based Buffer Overflow Affecting tigervnc-server package, versions <0:1.13.1-14.el8_10


Severity

Recommended
0.0
high
0
10

Based on AlmaLinux security rating

    Threat Intelligence

    EPSS
    0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ALMALINUX8-TIGERVNCSERVER-8382366
  • published 15 Nov 2024
  • disclosed 4 Nov 2024

How to fix?

Upgrade AlmaLinux:8 tigervnc-server to version 0:1.13.1-14.el8_10 or higher.
This issue was patched in ALSA-2024:9540.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tigervnc-server package and not the tigervnc-server package as distributed by AlmaLinux. See How to fix? for AlmaLinux:8 relevant fixed versions and status.

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.

CVSS Scores

version 3.1
Expand this section

NVD

7.8 high
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

SUSE

7.8 high
Expand this section

Red Hat

7.8 high