-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2020.2831
libvncserver security update
18 August 2020
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libvncserver
Publisher: Red Hat
Operating System: Red Hat Enterprise Linux WS/Desktop 8
Red Hat Enterprise Linux Server 8
Red Hat
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2017-18922
Reference: ESB-2020.2746
ESB-2020.2727
ESB-2020.2657
ESB-2020.2469
Original Bulletin:
https://access.redhat.com/errata/RHSA-2020:3456
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: libvncserver security update
Advisory ID: RHSA-2020:3456-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3456
Issue date: 2020-08-17
CVE Names: CVE-2017-18922
=====================================================================
1. Summary:
An update for libvncserver is now available for Red Hat Enterprise Linux
8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat CodeReady Linux Builder EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream EUS (v. 8.1) - ppc64le, x86_64
3. Description:
LibVNCServer is a C library that enables you to implement VNC server
functionality into own programs.
Security Fix(es):
* libvncserver: websocket decoding buffer overflow (CVE-2017-18922)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1852356 - CVE-2017-18922 libvncserver: websocket decoding buffer overflow
6. Package List:
Red Hat Enterprise Linux AppStream EUS (v. 8.1):
Source:
libvncserver-0.9.11-9.el8_1.3.src.rpm
ppc64le:
libvncserver-0.9.11-9.el8_1.3.ppc64le.rpm
libvncserver-debuginfo-0.9.11-9.el8_1.3.ppc64le.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.ppc64le.rpm
x86_64:
libvncserver-0.9.11-9.el8_1.3.i686.rpm
libvncserver-0.9.11-9.el8_1.3.x86_64.rpm
libvncserver-debuginfo-0.9.11-9.el8_1.3.i686.rpm
libvncserver-debuginfo-0.9.11-9.el8_1.3.x86_64.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.i686.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.x86_64.rpm
Red Hat CodeReady Linux Builder EUS (v. 8.1):
Source:
libvncserver-0.9.11-9.el8_1.3.src.rpm
aarch64:
libvncserver-0.9.11-9.el8_1.3.aarch64.rpm
libvncserver-debuginfo-0.9.11-9.el8_1.3.aarch64.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.aarch64.rpm
libvncserver-devel-0.9.11-9.el8_1.3.aarch64.rpm
ppc64le:
libvncserver-debuginfo-0.9.11-9.el8_1.3.ppc64le.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.ppc64le.rpm
libvncserver-devel-0.9.11-9.el8_1.3.ppc64le.rpm
s390x:
libvncserver-0.9.11-9.el8_1.3.s390x.rpm
libvncserver-debuginfo-0.9.11-9.el8_1.3.s390x.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.s390x.rpm
libvncserver-devel-0.9.11-9.el8_1.3.s390x.rpm
x86_64:
libvncserver-debuginfo-0.9.11-9.el8_1.3.i686.rpm
libvncserver-debuginfo-0.9.11-9.el8_1.3.x86_64.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.i686.rpm
libvncserver-debugsource-0.9.11-9.el8_1.3.x86_64.rpm
libvncserver-devel-0.9.11-9.el8_1.3.i686.rpm
libvncserver-devel-0.9.11-9.el8_1.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-18922
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=NVOP
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=F2Uo
-----END PGP SIGNATURE-----
https://www.malwaredevil.com/2020/08/18/esb-2020-2831-redhat-libvncserver-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2831-redhat-libvncserver-multiple-vulnerabilities
No comments:
Post a Comment