TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
TigerVNC versiones anteriores a 1.10.1, es vulnerable al desbordamiento de búfer de la pila, que se presenta en la función TightDecoder::FilterGradient. La explotación de esta vulnerabilidad podría resultar potencialmente en una ejecución de código remota. Este ataque parece ser explotable a través de la conectividad de red.
An update that fixes 5 vulnerabilities is now available. This update for tigervnc fixes the following issues. Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder. Fixed a heap-based buffer overflow in CopyRectDecode. Fixed a heap-based buffer overflow in TightDecoder::FilterGradient. Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream. Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor. This update was imported from the SUSE:SLE-15-SP1:Update update project.