TightVNC ClientConnection Multiple Integer Overflow Vulnerabilities (Linux)

Summary
This host is running TightVNC and is prone to Multiple Integer Overflow Vulnerability.
Impact
Successful exploitation will let the attacker execute arbitrary codes in the context of the application and may cause remote code execution to compromise the affected remote system. Impact level: Application/System
Solution
Upgrade to the latest version 1.3.10 http://www.tightvnc.com/download.html
Insight
Multiple Integer Overflow due to signedness errors within the functions ClientConnection::CheckBufferSize and ClientConnection::CheckFileZipBufferSize in ClientConnection.cpp file fails to validate user input.
Affected
TightVNC version 1.3.9 and prior on Linux.
References