Mandriva Linux Security Advisory : libvncserver (MDVSA-2015:146)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Mandriva Linux host is missing one or more security

Description :

Updated libvncserver packages fix security vulnerabilities :

An integer overflow in liblzo before 2.07 allows attackers to cause a
denial of service or possibly code execution in applications using
performing LZO decompression on a compressed payload from the attacker

The libvncserver library is built with a bundled copy of minilzo,
which is a part of liblzo containing the vulnerable code.

A malicious VNC server can trigger incorrect memory management
handling by advertising a large screen size parameter to the VNC
client. This would result in multiple memory corruptions and could
allow remote code execution on the VNC client (CVE-2014-6051,

A malicious VNC client can trigger multiple DoS conditions on the VNC
server by advertising a large screen size, ClientCutText message
length and/or a zero scaling factor parameter (CVE-2014-6053,

A malicious VNC client can trigger multiple stack-based buffer
overflows by passing a long file and directory names and/or attributes
(FileTime) when using the file transfer message feature

See also :

Solution :

Update the affected lib64vncserver-devel, lib64vncserver0 and / or
linuxvnc packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82399 ()

Bugtraq ID:

CVE ID: CVE-2014-4607

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now