{"schema_version":"1.7.2","id":"OESA-2026-2253","modified":"2026-05-09T12:33:17Z","published":"2026-05-09T12:33:17Z","upstream":["CVE-2026-32853","CVE-2026-32854"],"summary":"libvncserver security update","details":"libvncserver is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to &amp;quot;export&amp;quot; a frame buffer via net: you set up a server and can connect to it via VNC viewers. If the server supports WebSockets (which LibVNCServer does), you can also connect using an in-browser VNC viewer like noVNC. It is already in wide use for administration, but it is not that easy to program a server yourself.\r\n\r\nSecurity Fix(es):\n\nLibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.(CVE-2026-32853)\n\nLibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.(CVE-2026-32854)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"libvncserver","purl":"pkg:rpm/openEuler/libvncserver&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.13-4.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["libvncserver-0.9.13-4.oe2403sp1.aarch64.rpm","libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64.rpm","libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64.rpm","libvncserver-devel-0.9.13-4.oe2403sp1.aarch64.rpm"],"src":["libvncserver-0.9.13-4.oe2403sp1.src.rpm"],"x86_64":["libvncserver-0.9.13-4.oe2403sp1.x86_64.rpm","libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64.rpm","libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64.rpm","libvncserver-devel-0.9.13-4.oe2403sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2253"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32854"}],"database_specific":{"severity":"High"}}
