Search for vulnerabilities
Vulnerability details: VCID-88mq-ykh1-aaap
Vulnerability ID VCID-88mq-ykh1-aaap
Aliases CVE-2014-6052
Summary The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-6052.html
rhas Moderate https://access.redhat.com/errata/RHSA-2014:1826
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01107 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01128 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01128 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01128 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01128 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01441 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.01441 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.03524 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.0454 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
epss 0.12734 https://api.first.org/data/v1/epss?cve=CVE-2014-6052
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1144288
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
generic_textual Medium http://seclists.org/oss-sec/2014/q3/639
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2014-6052
generic_textual Medium https://ubuntu.com/security/notices/USN-2365-1
generic_textual Medium http://www.kde.org/info/security/advisory-20140923-1.txt
generic_textual Medium http://www.ocert.org/advisories/ocert-2014-007.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-6052.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json
https://api.first.org/data/v1/epss?cve=CVE-2014-6052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055
http://seclists.org/oss-sec/2014/q3/639
http://secunia.com/advisories/61506
http://secunia.com/advisories/61682
https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
https://security.gentoo.org/glsa/201507-07
https://ubuntu.com/security/notices/USN-2365-1
https://usn.ubuntu.com/4587-1/
http://ubuntu.com/usn/usn-2365-1
http://www.debian.org/security/2014/dsa-3081
http://www.kde.org/info/security/advisory-20140923-1.txt
http://www.ocert.org/advisories/ocert-2014-007.html
http://www.openwall.com/lists/oss-security/2014/09/25/11
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.securityfocus.com/bid/70091
1144288 https://bugzilla.redhat.com/show_bug.cgi?id=1144288
762745 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745
cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
CVE-2014-6052 https://nvd.nist.gov/vuln/detail/CVE-2014-6052
RHSA-2014:1826 https://access.redhat.com/errata/RHSA-2014:1826
USN-2365-1 https://usn.ubuntu.com/2365-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2014-6052
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.84911
EPSS Score 0.01107
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.