<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for LibVNCServer</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:0060-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-29T05:55:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-29T05:55:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-29T05:55:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for LibVNCServer</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2019-60,SUSE-SLE-SAP-12-SP1-2019-60</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      <Description>Link for SUSE-SU-2019:0060-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:0060-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120114</URL>
      <Description>SUSE Bug 1120114</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120115</URL>
      <Description>SUSE Bug 1120115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120116</URL>
      <Description>SUSE Bug 1120116</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120117</URL>
      <Description>SUSE Bug 1120117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120118</URL>
      <Description>SUSE Bug 1120118</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120119</URL>
      <Description>SUSE Bug 1120119</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120120</URL>
      <Description>SUSE Bug 1120120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120121</URL>
      <Description>SUSE Bug 1120121</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120122</URL>
      <Description>SUSE Bug 1120122</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15126/</URL>
      <Description>SUSE CVE CVE-2018-15126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15127/</URL>
      <Description>SUSE CVE CVE-2018-15127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20019/</URL>
      <Description>SUSE CVE CVE-2018-20019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20020/</URL>
      <Description>SUSE CVE CVE-2018-20020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20021/</URL>
      <Description>SUSE CVE CVE-2018-20021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20022/</URL>
      <Description>SUSE CVE CVE-2018-20022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20023/</URL>
      <Description>SUSE CVE CVE-2018-20023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20024/</URL>
      <Description>SUSE CVE CVE-2018-20024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6307/</URL>
      <Description>SUSE CVE CVE-2018-6307 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="LibVNCServer-devel-0.9.9-17.8.1">
      <FullProductName ProductID="LibVNCServer-devel-0.9.9-17.8.1">LibVNCServer-devel-0.9.9-17.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvncclient0-0.9.9-17.8.1">
      <FullProductName ProductID="libvncclient0-0.9.9-17.8.1">libvncclient0-0.9.9-17.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvncserver0-0.9.9-17.8.1">
      <FullProductName ProductID="libvncserver0-0.9.9-17.8.1">libvncserver0-0.9.9-17.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="linuxvnc-0.9.9-17.8.1">
      <FullProductName ProductID="linuxvnc-0.9.9-17.8.1">linuxvnc-0.9.9-17.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libvncclient0-0.9.9-17.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1">libvncclient0-0.9.9-17.8.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvncserver0-0.9.9-17.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1">libvncserver0-0.9.9-17.8.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-15126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15126.html</URL>
        <Description>CVE-2018-15126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120114</URL>
        <Description>SUSE Bug 1120114</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-15127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15127.html</URL>
        <Description>CVE-2018-15127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120117</URL>
        <Description>SUSE Bug 1120117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123828</URL>
        <Description>SUSE Bug 1123828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123832</URL>
        <Description>SUSE Bug 1123832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-20019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20019.html</URL>
        <Description>CVE-2018-20019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120118</URL>
        <Description>SUSE Bug 1120118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123823</URL>
        <Description>SUSE Bug 1123823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155442</URL>
        <Description>SUSE Bug 1155442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-20020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20020.html</URL>
        <Description>CVE-2018-20020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120116</URL>
        <Description>SUSE Bug 1120116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155472</URL>
        <Description>SUSE Bug 1155472</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM</Note>
    </Notes>
    <CVE>CVE-2018-20021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20021.html</URL>
        <Description>CVE-2018-20021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120122</URL>
        <Description>SUSE Bug 1120122</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR</Note>
    </Notes>
    <CVE>CVE-2018-20022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20022.html</URL>
        <Description>CVE-2018-20022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120120</URL>
        <Description>SUSE Bug 1120120</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR</Note>
    </Notes>
    <CVE>CVE-2018-20023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20023.html</URL>
        <Description>CVE-2018-20023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120119</URL>
        <Description>SUSE Bug 1120119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.</Note>
    </Notes>
    <CVE>CVE-2018-20024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20024.html</URL>
        <Description>CVE-2018-20024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120121</URL>
        <Description>SUSE Bug 1120121</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-6307</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncclient0-0.9.9-17.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvncserver0-0.9.9-17.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20190060-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6307.html</URL>
        <Description>CVE-2018-6307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120115</URL>
        <Description>SUSE Bug 1120115</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
