ID

VAR-202006-1842


CVE

CVE-2020-14404


TITLE

LibVNCServer Buffer error vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-006689

DESCRIPTION

An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings. LibVNCServer Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ========================================================================== Ubuntu Security Notice USN-4573-1 October 07, 2020 vino vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Vino. Software Description: - vino: VNC server for GNOME Details: Nicolas Ruff discovered that Vino incorrectly handled large ClientCutText messages. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2014-6053) It was discovered that Vino incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain sensitive information, cause a denial of service, or execute arbitrary code. (CVE-2018-7225) Pavel Cheremushkin discovered that an information disclosure vulnerability existed in Vino when sending a ServerCutText message. An attacker could possibly use this issue to expose sensitive information. (CVE-2019-15681) It was discovered that Vino incorrectly handled region clipping. A remote attacker could possibly use this issue to cause Vino to crash, resulting in a denial of service. (CVE-2020-14397) It was discovered that Vino incorrectly handled encodings. A remote attacker could use this issue to cause Vino to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-14402, CVE-2020-14403, CVE-2020-14404) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: vino 3.22.0-5ubuntu2.1 Ubuntu 18.04 LTS: vino 3.22.0-3ubuntu1.1 Ubuntu 16.04 LTS: vino 3.8.1-0ubuntu9.3 After a standard system update you need to restart your session to make all the necessary changes. References: https://usn.ubuntu.com/4573-1 CVE-2014-6053, CVE-2018-7225, CVE-2019-15681, CVE-2020-14397, CVE-2020-14402, CVE-2020-14403, CVE-2020-14404 Package Information: https://launchpad.net/ubuntu/+source/vino/3.22.0-5ubuntu2.1 https://launchpad.net/ubuntu/+source/vino/3.22.0-3ubuntu1.1 https://launchpad.net/ubuntu/+source/vino/3.8.1-0ubuntu9.3

Trust: 1.71

sources: NVD: CVE-2020-14404 // JVNDB: JVNDB-2020-006689 // PACKETSTORM: 159499

AFFECTED PRODUCTS

vendor:siemensmodel:simatic itc2200scope:gteversion:3.0.0.0

Trust: 1.0

vendor:libvncmodel:libvncserverscope:ltversion:0.9.12

Trust: 1.0

vendor:siemensmodel:simatic itc1500 proscope:gteversion:3.0.0.0

Trust: 1.0

vendor:siemensmodel:simatic itc2200 proscope:ltversion:3.2.1.0

Trust: 1.0

vendor:siemensmodel:simatic itc1900 proscope:gteversion:3.0.0.0

Trust: 1.0

vendor:siemensmodel:simatic itc2200scope:ltversion:3.2.1.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:siemensmodel:simatic itc1900scope:gteversion:3.0.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:siemensmodel:simatic itc1500scope:gteversion:3.0.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:siemensmodel:simatic itc2200 proscope:gteversion:3.0.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:siemensmodel:simatic itc1900 proscope:ltversion:3.2.1.0

Trust: 1.0

vendor:siemensmodel:simatic itc1500 proscope:ltversion:3.2.1.0

Trust: 1.0

vendor:siemensmodel:simatic itc1900scope:ltversion:3.2.1.0

Trust: 1.0

vendor:siemensmodel:simatic itc1500scope:ltversion:3.2.1.0

Trust: 1.0

vendor:libvncmodel:libvncserverscope:eqversion:0.9.13

Trust: 0.8

sources: JVNDB: JVNDB-2020-006689 // NVD: CVE-2020-14404

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-14404
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-006689
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202006-1183
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-14404
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-006689
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-14404
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-006689
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-006689 // CNNVD: CNNVD-202006-1183 // NVD: CVE-2020-14404

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-119

Trust: 0.8

sources: JVNDB: JVNDB-2020-006689 // NVD: CVE-2020-14404

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 159499 // CNNVD: CNNVD-202006-1183

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202006-1183

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006689

PATCH

title:libvncserver: encodings: prevent OOB accessesurl:https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff

Trust: 0.8

title:Comparing changesurl:https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13

Trust: 0.8

title:LibVNCServer Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=125633

Trust: 0.6

sources: JVNDB: JVNDB-2020-006689 // CNNVD: CNNVD-202006-1183

EXTERNAL IDS

db:NVDid:CVE-2020-14404

Trust: 2.5

db:SIEMENSid:SSA-390195

Trust: 1.6

db:JVNDBid:JVNDB-2020-006689

Trust: 0.8

db:PACKETSTORMid:159499

Trust: 0.7

db:AUSCERTid:ESB-2020.2248

Trust: 0.6

db:AUSCERTid:ESB-2020.2535

Trust: 0.6

db:AUSCERTid:ESB-2020.2727

Trust: 0.6

db:AUSCERTid:ESB-2020.3465

Trust: 0.6

db:AUSCERTid:ESB-2020.2972

Trust: 0.6

db:CS-HELPid:SB2021121649

Trust: 0.6

db:NSFOCUSid:48913

Trust: 0.6

db:CNNVDid:CNNVD-202006-1183

Trust: 0.6

sources: JVNDB: JVNDB-2020-006689 // PACKETSTORM: 159499 // CNNVD: CNNVD-202006-1183 // NVD: CVE-2020-14404

REFERENCES

url:https://github.com/libvnc/libvncserver/compare/libvncserver-0.9.12...libvncserver-0.9.13

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf

Trust: 1.6

url:https://usn.ubuntu.com/4434-1/

Trust: 1.6

url:https://usn.ubuntu.com/4573-1/

Trust: 1.6

url:https://github.com/libvnc/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-14404

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14404

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2248/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2535/

Trust: 0.6

url:https://vigilance.fr/vulnerability/libvncserver-multiple-vulnerabilities-32651

Trust: 0.6

url:http://www.nsfocus.net/vulndb/48913

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2727/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3465/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121649

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2972/

Trust: 0.6

url:https://packetstormsecurity.com/files/159499/ubuntu-security-notice-usn-4573-1.html

Trust: 0.6

url:https://launchpad.net/ubuntu/+source/vino/3.8.1-0ubuntu9.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14402

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15681

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vino/3.22.0-5ubuntu2.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14403

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vino/3.22.0-3ubuntu1.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14397

Trust: 0.1

url:https://usn.ubuntu.com/4573-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7225

Trust: 0.1

sources: JVNDB: JVNDB-2020-006689 // PACKETSTORM: 159499 // CNNVD: CNNVD-202006-1183 // NVD: CVE-2020-14404

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 159499 // CNNVD: CNNVD-202006-1183

SOURCES

db:JVNDBid:JVNDB-2020-006689
db:PACKETSTORMid:159499
db:CNNVDid:CNNVD-202006-1183
db:NVDid:CVE-2020-14404

LAST UPDATE DATE

2024-11-23T20:16:55.390000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-006689date:2020-07-15T00:00:00
db:CNNVDid:CNNVD-202006-1183date:2022-03-10T00:00:00
db:NVDid:CVE-2020-14404date:2024-11-21T05:03:11.830

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-006689date:2020-07-15T00:00:00
db:PACKETSTORMid:159499date:2020-10-07T16:06:41
db:CNNVDid:CNNVD-202006-1183date:2020-06-17T00:00:00
db:NVDid:CVE-2020-14404date:2020-06-17T16:15:12.290