Description
UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199.
Published: 2019-03-05
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-17657 UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199.
History

No history.

Subscriptions

Siemens Sinumerik Access Mymachine\/p2p Sinumerik Pcu Base Win10 Software\/ipc Sinumerik Pcu Base Win7 Software\/ipc
Uvnc Ultravnc
cve-icon MITRE

Status: PUBLISHED

Assigner: Kaspersky

Published:

Updated: 2024-09-16T20:59:11.748Z

Reserved: 2019-02-12T00:00:00.000Z

Link: CVE-2019-8259

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-05T15:29:00.367

Modified: 2024-11-21T04:49:35.657

Link: CVE-2019-8259

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses