LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.
References
| Link | Resource |
|---|---|
| https://github.com/LibVNC/libvncserver/commit/dc78dee51a7e270e537a541a17befdf2073f5314 | Patch |
| https://github.com/LibVNC/libvncserver/security/advisories/GHSA-xjp8-4qqv-5x4x | Exploit Vendor Advisory |
| https://www.vulncheck.com/advisories/libvncserver-httpd-proxy-null-pointer-dereference | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 18:16
Updated : 2026-03-25 21:57
NVD link : CVE-2026-32854
Mitre link : CVE-2026-32854
CVE.ORG link : CVE-2026-32854
JSON object : View
Products Affected
libvncserver_project
- libvncserver
CWE
CWE-476
NULL Pointer Dereference
