{"id":"CVE-2019-20788","details":"libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.","modified":"2026-04-02T02:06:51.981411Z","published":"2020-04-23T19:15:12.763Z","related":["MGASA-2020-0207","SUSE-SU-2020:1164-1","SUSE-SU-2020:1164-2","SUSE-SU-2020:1165-1","SUSE-SU-2020:14355-1","openSUSE-SU-2020:0624-1","openSUSE-SU-2024:10598-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4407-1/"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf"},{"type":"FIX","url":"https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed"},{"type":"EVIDENCE","url":"https://securitylab.github.com/advisories/GHSL-2020-064-libvnc-libvncclient"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvnc/libvncserver","events":[{"introduced":"0"},{"last_affected":"0a70095271d845d16a3ed17354841b01f33963ad"},{"fixed":"54220248886b5001fbbb9fa73c4e1a2cb9413fed"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.9.12"}]}}],"versions":["LibVNCServer-0.9.10","LibVNCServer-0.9.11","LibVNCServer-0.9.12","LibVNCServer-0.9.8","LibVNCServer-0.9.8.1","LibVNCServer-0.9.8.2","LibVNCServer-0.9.9","X11VNC_0_9_10","X11VNC_0_9_11","X11VNC_0_9_12","X11VNC_0_9_7","X11VNC_0_9_8","X11VNC_0_9_9","X11VNC_REL_0_9_4","X11VNC_REL_0_9_5","X11VNC_REL_0_9_6"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"file":"libvncclient/cursor.c","function":"HandleCursorShape"},"digest":{"function_hash":"166509097659370788785687778228924176187","length":2878},"source":"https://github.com/libvnc/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed","signature_type":"Function","id":"CVE-2019-20788-189abd97","signature_version":"v1"},{"deprecated":false,"target":{"file":"libvncclient/cursor.c"},"digest":{"threshold":0.9,"line_hashes":["102057262279662452688778988803141241357","175955773102106351237323041340518821685","240545567691954465949188256110399956644","204796747639085440341262894639991613085"]},"source":"https://github.com/libvnc/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed","signature_type":"Line","id":"CVE-2019-20788-36246abd","signature_version":"v1"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20788.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}