It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
|Base Score:||9.8||Base Metrics:||AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H|
|Access Vector:||Network||Attack Complexity:||Low|
|Privileges Required:||None||User Interaction:||None|
|Integrity Impact:||High||Availability Impact:||High|
|Oracle Linux version 7 (libvncserver)||ELSA-2020-3281||2020-08-04|
|Oracle Linux version 8 (libvncserver)||ELSA-2020-3385||2020-08-10|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team