{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2019-15690","assignerOrgId":"e45d732a-8f6b-4b6b-be76-7420f6a2b988","state":"PUBLISHED","assignerShortName":"Kaspersky","dateReserved":"2019-08-27T00:00:00.000Z","datePublished":"2025-01-24T17:53:58.866Z","dateUpdated":"2025-01-24T18:22:55.433Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e45d732a-8f6b-4b6b-be76-7420f6a2b988","shortName":"Kaspersky","dateUpdated":"2025-01-24T17:53:58.866Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-122","description":"CWE-122: Heap-based Buffer Overflow","type":"CWE"}]}],"affected":[{"vendor":"LibVNC","product":"LibVNCServer","versions":[{"version":"*","status":"affected","lessThanOrEqual":"0.9.12","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution."}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}}],"solutions":[{"lang":"en","value":"Update LibVNCServer to the commit with hash 54220248886b5001fbbb9fa73c4e1a2cb9413fed or newer."}],"timeline":[{"time":"2020-03-23T00:00:00.000Z","lang":"en","value":"Advisory published by Kaspersky"}],"credits":[{"lang":"en","value":"Pavel Cheremushkin from Kaspersky","type":"finder"}],"references":[{"url":"https://ics-cert.kaspersky.com/vulnerabilities/klcert-20-009-remote-code-execution-on-libvnc-version-prior-to-0-9-12/","name":"KLCERT-20-009: Remote Code Execution on LibVNC version prior to 0.9.12","tags":["third-party-advisory"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-24T18:22:46.983882Z","id":"CVE-2019-15690","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-24T18:22:55.433Z"}}]}}