{"id":"CVE-2020-14399","details":"An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly \"no trust boundary crossed.","modified":"2026-04-10T06:41:11.264066Z","published":"2020-06-17T16:15:11.930Z","related":["MGASA-2020-0280","SUSE-SU-2020:14424-1","SUSE-SU-2020:1922-1","SUSE-SU-2020:2167-1","openSUSE-SU-2020:0988-1","openSUSE-SU-2020:1025-1","openSUSE-SU-2020:1056-1","openSUSE-SU-2024:10598-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"},{"type":"ADVISORY","url":"https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4434-1/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1860354"},{"type":"FIX","url":"https://github.com/LibVNC/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvnc/libvncserver","events":[{"introduced":"0"},{"fixed":"2aa20dad4c23c18948d3f63b33f9dfec1f837729"},{"fixed":"23e5cbe6b090d7f22982aee909a6a618174d3c2d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.9.13"}]}}],"versions":["LibVNCServer-0.9.10","LibVNCServer-0.9.11","LibVNCServer-0.9.12","LibVNCServer-0.9.8","LibVNCServer-0.9.9","X11VNC_0_9_10","X11VNC_0_9_11","X11VNC_0_9_12","X11VNC_0_9_7","X11VNC_0_9_8","X11VNC_0_9_9","X11VNC_REL_0_9_4","X11VNC_REL_0_9_5","X11VNC_REL_0_9_6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14399.json","vanir_signatures":[{"signature_type":"Function","deprecated":false,"target":{"file":"libvncclient/rfbproto.c","function":"SetFormatAndEncodings"},"source":"https://github.com/libvnc/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d","digest":{"function_hash":"292719199051264423232023195326445512722","length":6767},"id":"CVE-2020-14399-2ff28e15","signature_version":"v1"},{"signature_type":"Line","deprecated":false,"target":{"file":"libvncclient/rfbproto.c"},"source":"https://github.com/libvnc/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d","digest":{"threshold":0.9,"line_hashes":["289411994645727400457192257966915221379","208837877831103949359398245394014295558","332985853190493794914941061839301886752","88759214378154492617504044073384416189","101271520213990510100092381220390867601","55113811666554751528682358494177991134","181492142388692610613554751535531639094","218617286323755537607650297728216934745","29442809713893014097360319726760739566","285295838407132926322499123666082004538"]},"id":"CVE-2020-14399-4d282684","signature_version":"v1"}],"vanir_signatures_modified":"2026-04-10T06:41:11Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}