{"id":"CVE-2018-20749","details":"LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.","modified":"2026-04-02T01:20:48.867385Z","published":"2019-01-30T18:29:00.410Z","related":["MGASA-2020-0435","SUSE-SU-2019:0283-1","SUSE-SU-2019:0313-1","SUSE-SU-2019:0313-2","SUSE-SU-2019:13952-1","openSUSE-SU-2019:0196-1","openSUSE-SU-2024:10598-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/106825"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3877-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4547-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4587-1/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html"},{"type":"REPORT","url":"https://github.com/LibVNC/libvncserver/issues/273"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf"},{"type":"FIX","url":"https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2018/12/10/8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvnc/libvncserver","events":[{"introduced":"0"},{"fixed":"0a70095271d845d16a3ed17354841b01f33963ad"},{"fixed":"15bb719c03cc70f14c36a843dcb16ed69b405707"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.9.12"}]}}],"versions":["LibVNCServer-0.9.10","LibVNCServer-0.9.11","LibVNCServer-0.9.8","LibVNCServer-0.9.8.1","LibVNCServer-0.9.8.2","LibVNCServer-0.9.9","X11VNC_0_9_10","X11VNC_0_9_11","X11VNC_0_9_12","X11VNC_0_9_7","X11VNC_0_9_8","X11VNC_0_9_9","X11VNC_REL_0_9_4","X11VNC_REL_0_9_5","X11VNC_REL_0_9_6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-20749.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}