<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2024-0039</id>
    <title>An update for tigervnc is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2024-05-27 09:02:18"/>
    <updated date="2024-05-27 09:02:18"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2011-1775" id="CVE-2011-1775" title="CVE-2011-1775 Base Score: 5.8 Vector: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2014-0011" id="CVE-2014-0011" title="CVE-2014-0011 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-7392" id="CVE-2017-7392" title="CVE-2017-7392 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2014-8240" id="CVE-2014-8240" title="CVE-2014-8240 Base Score: 7.5 Vector: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-7394" id="CVE-2017-7394" title="CVE-2017-7394 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-7395" id="CVE-2017-7395" title="CVE-2017-7395 Base Score: 6.5 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2014-8241" id="CVE-2014-8241" title="CVE-2014-8241 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-7393" id="CVE-2017-7393" title="CVE-2017-7393 Base Score: 8.8 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

The CSecurityTLS::processMsg function in common/rfb/CSecurityTLS.cxx in the vncviewer component in TigerVNC 1.1beta1 does not properly verify the server's X.509 certificate, which allows man-in-the-middle attackers to spoof a TLS VNC server via an arbitrary certificate. (CVE-2011-1775)

Multiple heap-based buffer overflows in the ZRLE_DECODE function in common/rfb/zrleDecode.h in TigerVNC before 1.3.1, when NDEBUG is enabled, allow remote VNC servers to cause a denial of service (vncviewer crash) and possibly execute arbitrary code via vectors related to screen image rendering. (CVE-2014-0011)

In TigerVNC 1.7.1 (SSecurityVeNCrypt.cxx SSecurityVeNCrypt::SSecurityVeNCrypt), an unauthenticated client can cause a small memory leak in the server. (CVE-2017-7392)

Integer overflow in TigerVNC allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to screen size handling, which triggers a heap-based buffer overflow, a similar issue to CVE-2014-6051. (CVE-2014-8240)

In TigerVNC 1.7.1 (SSecurityPlain.cxx SSecurityPlain::processMsg), unauthenticated users can crash the server by sending long usernames. (CVE-2017-7394)

In TigerVNC 1.7.1 (SMsgReader.cxx SMsgReader::readClientCutText), by causing an integer overflow, an authenticated client can crash the server. (CVE-2017-7395)

XRegion in TigerVNC allows remote VNC servers to cause a denial of service (NULL pointer dereference) by leveraging failure to check a malloc return value, a similar issue to CVE-2014-6052. (CVE-2014-8241)

In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution. (CVE-2017-7393)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="tigervnc">
        <name>HCE 1.1</name>
        <package arch="noarch" name="tigervnc-license" version="1.8.0" release="22.hce1c">
          <filename>tigervnc-license-1.8.0-22.hce1c.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="tigervnc-server-minimal" version="1.8.0" release="22.hce1c">
          <filename>tigervnc-server-minimal-1.8.0-22.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
