CVE-2019-15680
29.10.2019, 19:15
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.Enginsight
| Vendor | Product | Version |
|---|---|---|
| tightvnc | tightvnc | 1.3.10 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| libvncserver |
| ||||||||||||||||||||||||||||
| ssvnc |
| ||||||||||||||||||||||||||||
| tightvnc |
| ||||||||||||||||||||||||||||
| veyon |
| ||||||||||||||||||||||||||||
| vncsnapshot |
| ||||||||||||||||||||||||||||
| x11vnc |
|
Common Weakness Enumeration
References