Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2014-6054
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-06 Oct, 2014 | 14:55
Updated At-06 May, 2026 | 22:30

The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

libvncserver
libvncserver
>>libvncserver>>Versions up to 0.9.9(inclusive)
cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>7.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.htmlcve@mitre.org
N/A
http://seclists.org/oss-sec/2014/q3/639cve@mitre.org
Mailing List
Third Party Advisory
http://secunia.com/advisories/61506cve@mitre.org
N/A
http://secunia.com/advisories/61682cve@mitre.org
N/A
http://www.debian.org/security/2014/dsa-3081cve@mitre.org
Third Party Advisory
http://www.ocert.org/advisories/ocert-2014-007.htmlcve@mitre.org
Third Party Advisory
US Government Resource
http://www.openwall.com/lists/oss-security/2014/09/25/11cve@mitre.org
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/70094cve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-2365-1cve@mitre.org
Third Party Advisory
https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446cve@mitre.org
Issue Tracking
Patch
https://lists.debian.org/debian-lts-announce/2019/10/msg00042.htmlcve@mitre.org
N/A
https://security.gentoo.org/glsa/201507-07cve@mitre.org
N/A
https://usn.ubuntu.com/4587-1/cve@mitre.org
N/A
http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://seclists.org/oss-sec/2014/q3/639af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://secunia.com/advisories/61506af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61682af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2014/dsa-3081af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ocert.org/advisories/ocert-2014-007.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.openwall.com/lists/oss-security/2014/09/25/11af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/70094af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2365-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
https://lists.debian.org/debian-lts-announce/2019/10/msg00042.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://security.gentoo.org/glsa/201507-07af854a3a-2127-422b-91ae-364da2661108
N/A
https://usn.ubuntu.com/4587-1/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://seclists.org/oss-sec/2014/q3/639
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://secunia.com/advisories/61506
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61682
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-3081
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.ocert.org/advisories/ocert-2014-007.html
Source: cve@mitre.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.openwall.com/lists/oss-security/2014/09/25/11
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/70094
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2365-1
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
Source: cve@mitre.org
Resource:
Issue Tracking
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/201507-07
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4587-1/
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://seclists.org/oss-sec/2014/q3/639
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://secunia.com/advisories/61506
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61682
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-3081
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.ocert.org/advisories/ocert-2014-007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.openwall.com/lists/oss-security/2014/09/25/11
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/70094
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2365-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/201507-07
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4587-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found