Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 257953 (CVE-2009-0388) - <=net-misc/tightvnc-1.3.9 heap corruption and application crash (CVE-2009-0388)
Summary: <=net-misc/tightvnc-1.3.9 heap corruption and application crash (CVE-2009-0388)
Status: RESOLVED INVALID
Alias: CVE-2009-0388
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://vnc-tight.svn.sourceforge.net/...
Whiteboard: B1 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-02-06 21:57 UTC by Stefan Behte (RETIRED)
Modified: 2009-08-23 22:23 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2009-02-06 21:57:31 UTC
CVE-2009-0388 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0388):
  Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5
  and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of
  service (heap corruption and application crash) or possibly execute
  arbitrary code via a large length value in a message, related to the
  (a) ClientConnection::CheckBufferSize and (b)
  ClientConnection::CheckFileZipBufferSize functions in
  ClientConnection.cpp.
Comment 1 Raúl Porcel (RETIRED) gentoo-dev 2009-02-07 11:38:57 UTC
Only affects windows and we don't have that tightvnc version.
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2009-02-09 18:55:10 UTC
We have net-misc/tightvnc-1.3.9 or do you mean that we do not have the windows version?!?
Where did you find information that only windows is affected? I didn't search too much (that's why the bug's state is still "NEW" and not "ASSIGNED"), because I'm currently very short on time, sorry...
Comment 3 Raúl Porcel (RETIRED) gentoo-dev 2009-02-09 19:05:57 UTC
(In reply to comment #2)
> We have net-misc/tightvnc-1.3.9 or do you mean that we do not have the windows
> version?!?
> Where did you find information that only windows is affected? I didn't search
> too much (that's why the bug's state is still "NEW" and not "ASSIGNED"),
> because I'm currently very short on time, sorry...
> 

Oh, sorry, didn't saw the 1.3.9 thing.

Anyway, it says it affects tightvnc and ultravnc. Ultravnc is windows-only, and i think tightvnc's windows version is based on ultravnc.  The URL you posted: http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564 , also only has changes on the windows part.
Comment 4 Christian Hoffmann (RETIRED) gentoo-dev 2009-02-09 21:14:56 UTC
Someone who has enough time could try the exploit to see if we are vulnerable =)
http://www.milw0rm.com/exploits/8024
Comment 5 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-23 22:23:30 UTC
- The directory of the commit is ".../vnc_winsrc/..."
- We don't have a ClientConnection.cpp
- The exploits crash rather than TightVNC

-> NFU