CVE-2026-32854

Severity
6.3MEDIUM
EPSS
1.8%
top 17.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24

Description

LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages3 packages

Debianlibvncserver< 0.9.15+dfsg-3
CVEListV5libvnc/libvncserver0.9.15

Patches

🔴Vulnerability Details

2
CVEList
LibVNCServer httpd proxy NULL Pointer Dereference2026-03-24
OSV
CVE-2026-32854: LibVNCServer versions 02026-03-24

📋Vendor Advisories

2
Red Hat
LibVNCServer: LibVNCServer: Denial of Service via specially crafted HTTP requests2026-03-24
Debian
CVE-2026-32854: libvncserver - LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null po...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-32854 Impact, Exploitability, and Mitigation Steps | Wiz