{"id":"CVE-2020-14401","details":"An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.","modified":"2026-04-02T04:09:39.478805Z","published":"2020-06-17T16:15:12.087Z","related":["MGASA-2020-0280","SUSE-SU-2020:14424-1","SUSE-SU-2020:1922-1","SUSE-SU-2020:2167-1","openSUSE-SU-2020:0988-1","openSUSE-SU-2020:1025-1","openSUSE-SU-2020:1056-1","openSUSE-SU-2024:10598-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html"},{"type":"ADVISORY","url":"https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4434-1/"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf"},{"type":"FIX","url":"https://github.com/LibVNC/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvnc/libvncserver","events":[{"introduced":"0"},{"fixed":"2aa20dad4c23c18948d3f63b33f9dfec1f837729"},{"fixed":"a6788d1da719ae006605b78d22f5a9f170b423af"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.9.13"}]}}],"versions":["LibVNCServer-0.9.10","LibVNCServer-0.9.11","LibVNCServer-0.9.12","LibVNCServer-0.9.8","LibVNCServer-0.9.8.1","LibVNCServer-0.9.8.2","LibVNCServer-0.9.9","X11VNC_0_9_10","X11VNC_0_9_11","X11VNC_0_9_12","X11VNC_0_9_7","X11VNC_0_9_8","X11VNC_0_9_9","X11VNC_REL_0_9_4","X11VNC_REL_0_9_5","X11VNC_REL_0_9_6"],"database_specific":{"vanir_signatures":[{"signature_type":"Line","source":"https://github.com/libvnc/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af","signature_version":"v1","id":"CVE-2020-14401-b9e34590","deprecated":false,"digest":{"line_hashes":["248208949429347463031521643800921156886","267256123706877668341539977664866338222","69871433148263572302381190377581994547","163000897568946296525180340287495104796"],"threshold":0.9},"target":{"file":"libvncserver/scale.c"}},{"signature_type":"Function","source":"https://github.com/libvnc/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af","signature_version":"v1","id":"CVE-2020-14401-f7899987","deprecated":false,"digest":{"length":3173,"function_hash":"285897253734337289413665599072403539224"},"target":{"function":"rfbScaledScreenUpdateRect","file":"libvncserver/scale.c"}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14401.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]},{"events":[{"introduced":"3.0.0.0"},{"fixed":"3.2.1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}]}