In TightVNC 1.3.10, there is an integer signedness error...
Critical severity
Unreviewed
Published
Jan 27, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Jan 26, 2022
Published to the GitHub Advisory Database
Jan 27, 2022
Last updated
Feb 3, 2023
In TightVNC 1.3.10, there is an integer signedness error and resultant heap-based buffer overflow in InitialiseRFBConnection in rfbproto.c (for the vncviewer component). There is no check on the size given to malloc, e.g., -1 is accepted. This allocates a chunk of size zero, which will give a heap pointer. However, one can send 0xffffffff bytes of data, which can have a DoS impact or lead to remote code execution.
References