LibVNCServer/LibVNCClient: Multiple vulnerabilities — GLSA 201702-24

Multiple vulnerabilities have been found in LibVNCServer/LibVNCClient, the worst of which allows remote attackers to execute arbitrary code when connecting to a malicious server.

Affected packages

net-libs/libvncserver on all architectures
Affected versions < 0.9.11
Unaffected versions >= 0.9.11

Background

LibVNCServer/LibVNCClient are cross-platform C libraries that allow you to easily implement VNC server or client functionality in your program.

Description

Multiple vulnerabilities have been discovered in LibVNCServer and LibVNCClient. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could entice a user to connect to a malicious VNC server or leverage Man-in-the-Middle attacks to cause the execution of arbitrary code with the privileges of the user running a VNC client linked against LibVNCClient.

Workaround

There is no known workaround at this time.

Resolution

All LibVNCServer/LibVNCClient users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/libvncserver-0.9.11"
 

References

Release date
February 20, 2017

Latest revision
February 20, 2017: 1

Severity
normal

Exploitable
remote

Bugzilla entries