{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-32854","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-03-16T18:11:41.759Z","datePublished":"2026-03-24T17:31:32.011Z","dateUpdated":"2026-03-27T03:52:19.164Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-24T17:31:32.011Z"},"title":"LibVNCServer httpd proxy NULL Pointer Dereference","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL pointer dereference","type":"CWE"}]}],"affected":[{"vendor":"LibVNC","product":"LibVNCServer","repo":"https://github.com/LibVNC/libvncserver","versions":[{"status":"affected","version":"0","lessThanOrEqual":"0.9.15","versionType":"semver"},{"status":"unaffected","version":"dc78dee51a7e270e537a541a17befdf2073f5314","versionType":"git"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.","supportingMedia":[{"type":"text/html","base64":false,"value":"LibVNCServer versions 0.9.15 and prior (fixed in&nbsp;commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.<br>"}]}],"references":[{"url":"https://github.com/LibVNC/libvncserver/security/advisories/GHSA-xjp8-4qqv-5x4x","tags":["vendor-advisory"]},{"url":"https://github.com/LibVNC/libvncserver/commit/dc78dee51a7e270e537a541a17befdf2073f5314","tags":["patch"]},{"url":"https://www.vulncheck.com/advisories/libvncserver-httpd-proxy-null-pointer-dereference","tags":["third-party-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"MEDIUM","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}}],"credits":[{"lang":"en","value":"Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc.","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-27T03:52:09.338985Z","id":"CVE-2026-32854","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-27T03:52:19.164Z"}}]}}