Gentoo Linux Security Advisory 201702-24 - Multiple vulnerabilities have been found in LibVNCServer/LibVNCClient, the worst of which allows remote attackers to execute arbitrary code when connecting to a malicious server. Versions less than 0.9.11 are affected.
fb93b39ea7b4f80cb3bdec52ed16f6cc5abf7765ccfae9d37c0f7a995e295a71
Ubuntu Security Notice 3171-1 - Josef Gajdusek discovered that the LibVNCServer client library incorrectly handled certain FrameBufferUpdate messages. If a user were tricked into connecting to a malicious server, an attacker could use this issue to cause a denial of service, or possibly execute arbitrary code.
8b1ac71d61ad7fcfdc77e67ed5cbdb743bca75ab32f33e96d0bf0214b29cb7d5
Debian Linux Security Advisory 3753-1 - It was discovered that libvncserver, a collection of libraries used to implement VNC/RFB clients and servers, incorrectly processed incoming network packets. This resulted in several heap-based buffer overflows, allowing a rogue server to either cause a DoS by crashing the client, or potentially execute arbitrary code on the client side.
3765364083eeb5d390903842e409e9207be323312ec2bce0e8e728b3ca2b7671