{"id":"CVE-2017-18922","details":"It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.","modified":"2026-04-11T12:05:42.496327Z","published":"2020-06-30T11:15:10.380Z","related":["ALSA-2020:3385","SUSE-SU-2020:1873-1","SUSE-SU-2020:1922-1","SUSE-SU-2020:2167-1","openSUSE-SU-2020:0960-1","openSUSE-SU-2020:0978-1","openSUSE-SU-2020:0988-1","openSUSE-SU-2020:1025-1","openSUSE-SU-2020:1056-1","openSUSE-SU-2024:10598-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"19.10"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"20.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"31"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"32"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.1"}],"cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.2"}],"cpe":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}],"cpe":"cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}],"cpe":"cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}],"cpe":"cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}],"cpe":"cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}],"cpe":"cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}],"cpe":"cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/06/30/3"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2020/06/30/2"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1852356"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf"},{"type":"FIX","url":"https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433"},{"type":"FIX","url":"https://usn.ubuntu.com/4407-1/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvnc/libvncserver","events":[{"introduced":"0"},{"fixed":"0a70095271d845d16a3ed17354841b01f33963ad"},{"fixed":"aac95a9dcf4bbba87b76c72706c3221a842ca433"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"0.9.12"}],"cpe":"cpe:2.3:a:libvncserver_project:libvncserver:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["LibVNCServer-0.9.10","LibVNCServer-0.9.11","LibVNCServer-0.9.8","LibVNCServer-0.9.9","X11VNC_0_9_10","X11VNC_0_9_11","X11VNC_0_9_12","X11VNC_0_9_7","X11VNC_0_9_8","X11VNC_0_9_9","X11VNC_REL_0_9_4","X11VNC_REL_0_9_5","X11VNC_REL_0_9_6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-18922.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}