Jump to content
Nytro

CVE-2022-23967 - TightVNC 1.3.10

Recommended Posts

CVE-2022-23967
In TightVNC 1.3.10, there is an integer signedness error and resultant heap-based buffer overflow in InitialiseRFBConnection in rfbproto.c (for the vncviewer component). There is no check on the size given to malloc, e.g., -1 is accepted. This allocates a chunk of size zero, which will give a heap pointer. However, one can send 0xffffffff bytes of data, which can have a DoS impact or lead to remote code execution.

[Vulnerability Type] Buffer Overflow

[Vendor of Product] TightVNC

[Affected Product Code Base] vncviewer - 1.3.10

[Affected Component] file : rfbproto.c, function : InitialiseRFBConnection , line of code : 307

[Attack Type] Remote

[Impact Denial of Service] true

[Attack Vectors] You just need to setup a fake server, to interact with the vulnerable client.

[Discoverer] Maher Azzouzi

[Reference] https://www.tightvnc.com/licensing-server-x11.php

Use CVE-2022-23967.

 

Sursa: https://github.com/MaherAzzouzi/CVE-2022-23967

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...