{"id":"MGASA-2020-0280","summary":"Updated libvncserver packages fix security vulnerability","details":"Updated libvncserver packages fix security vulnerabilities:\n\nlibvncclient/sockets.c in LibVNCServer had a buffer overflow via a long\nsocket filename (CVE-2019-20839).\n\nlibvncserver/rfbregion.c had a NULL pointer dereference (CVE-2020-14397).\n\nByte-aligned data was accessed through uint32_t pointers in\nlibvncclient/rfbproto.c (CVE-2020-14399).\n\nByte-aligned data was accessed through uint16_t pointers in\nlibvncserver/translate.c (CVE-2020-14400).\n\nlibvncserver/scale.c had a pixel_value integer overflow (CVE-2020-14401).\n\nlibvncserver/corre.c allowed out-of-bounds access via encodings\n(CVE-2020-14402).\n\nlibvncserver/hextile.c allowed out-of-bounds access via encodings\n(CVE-2020-14403).\n\nlibvncserver/rre.c allowed out-of-bounds access via encodings\n(CVE-2020-14404).\n\nlibvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405).\n\nThe libvncserver package has been updated to version 0.9.13, fixing these\nissues and several others.  See the release announcement for details.\n","modified":"2026-03-25T17:45:14.289777Z","published":"2020-07-05T19:48:23Z","related":["CVE-2019-20839","CVE-2020-14397","CVE-2020-14398","CVE-2020-14399","CVE-2020-14400","CVE-2020-14401","CVE-2020-14402","CVE-2020-14403","CVE-2020-14404","CVE-2020-14405"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0280.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26881"},{"type":"REPORT","url":"https://github.com/LibVNC/libvncserver/releases/tag/LibVNCServer-0.9.13"},{"type":"REPORT","url":"https://www.debian.org/lts/security/2020/dla-2264"}],"affected":[{"package":{"name":"libvncserver","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libvncserver?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.13-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0280.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}