This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1995415030975362244==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="2mxoiW55lYvGoEmuAK5mXQ6eDrJCllbkR"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--2mxoiW55lYvGoEmuAK5mXQ6eDrJCllbkR
Content-Type: multipart/mixed; boundary="BKW9q1pe50V5bGXPcYH0ymAsXvvSY6LHQ";
protected-headers="v1"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <523deba4-05b0-6373-e5eb-f89dc286bd08@canonical.com>
Subject: [USN-3618-1] LibVNCServer vulnerability
--BKW9q1pe50V5bGXPcYH0ymAsXvvSY6LHQ
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-3618-1
April 04, 2018
libvncserver vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
LibVNCServer could be made to crash, expose sensitive information, or run
programs if it received specially crafted network traffic.
Software Description:
- libvncserver: vnc server library
Details:
It was discovered that LibVNCServer incorrectly handled certain packet
lengths. A remote attacker able to connect to a LibVNCServer could possibly
use this issue to obtain sensitive information, cause a denial of service,
or execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
libvncclient1 0.9.11+dfsg-1ubuntu0.1
libvncserver1 0.9.11+dfsg-1ubuntu0.1
Ubuntu 16.04 LTS:
libvncserver1 0.9.10+dfsg-3ubuntu0.16.04.2
Ubuntu 14.04 LTS:
libvncserver0 0.9.9+dfsg-1ubuntu1.3
After a standard system update you need to restart LibVNCServer
applications to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3618-1
CVE-2018-7225
Package Information:
https://launchpad.net/ubuntu/+source/libvncserver/0.9.11+dfsg-1ubuntu0.1
https://launchpad.net/ubuntu/+source/libvncserver/0.9.10+dfsg-3ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/libvncserver/0.9.9+dfsg-1ubuntu1.3
--BKW9q1pe50V5bGXPcYH0ymAsXvvSY6LHQ--
--2mxoiW55lYvGoEmuAK5mXQ6eDrJCllbkR
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----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=+pao
-----END PGP SIGNATURE-----
--2mxoiW55lYvGoEmuAK5mXQ6eDrJCllbkR--
--===============1995415030975362244==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============1995415030975362244==--
|