CVE-2019-15678 PUBLISHED

TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.

EPSS 2.63% · 85.6th percentile

Risk Scores

EPSS Score
2.63%
85.6th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSdirectvnc0.7.8-1, 0
Ubuntu:20.04:LTSbochs2.6.11+dfsg-1, 2.6.10+dfsg-2, 2.6.9+dfsg-5
Ubuntu:18.04:LTSx2vnc1.7.2-6, 0
Ubuntu:22.04:LTSvncsnapshot0, 1.2a-5.1build2
Ubuntu:22.04:LTSbochs0, 2.6.11+dfsg-4, 2.7+dfsg-2
Ubuntu:16.04:LTSx2vnc0, 1.7.2-5
Ubuntu:24.04:LTSvncsnapshot0, 1.2a-5.2
Ubuntu:20.04:LTSvncsnapshot0, 1.2a-5.1build2, 1.2a-5.1build1
Ubuntu:18.04:LTSvncsnapshot1.2a-5.1build1, 0, 1.2a-5.1
Ubuntu:20.04:LTSssvnc1.0.29-5, 1.0.29-4build1, 0
Ubuntu:25.10x2vnc1.7.2+git20100909.01ced3d-1, 0, 1.7.2+git20100909.01ced3d-2
Ubuntu:16.04:LTSdirectvnc0.7.7-1, 0
Ubuntu:16.04:LTSssvnc1.0.29-2+deb8u1build0.16.04.1, 0, 1.0.29-2build1
Ubuntu:24.04:LTSveyon4.7.5+repack1-1ubuntu1, 4.7.5+repack1-1ubuntu3, 4.7.5+repack1-1ubuntu4
Ubuntu:20.04:LTSx2vnc1.7.2-6, 0
Ubuntu:20.04:LTStightvnc1.3.10-0ubuntu5, 0
Ubuntu:24.04:LTStightvnc1:1.3.10-8, 0, 1:1.3.10-7
Ubuntu:18.04:LTSssvnc0, 1.0.29-3, 1.0.29-3build1
Ubuntu:25.10tightvnc1:1.3.10-10, 1:1.3.10-9, 0
Ubuntu:20.04:LTSdirectvnc0, 0.7.7-1build1

…and 21 more

Timeline

References

Open in Interactive Console →